{0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @ib={0x1b, 0x0, 0x9, {"8aa70fe0aa0ede7c09c210101caa3dec"}, 0x1, 0x1af88dd4}, @ib={0x1b, 0xee, 0xfffffffffffffc00, {"85fd0808d02c405658db20b07f8916da"}, 0xfff, 0x3}}}, 0x118) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x0, 0xffffffffffffffff}) 03:04:49 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file0,workdir=./file1']) r0 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 03:04:49 executing program 2: r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1, 0x41) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$int_in(r0, 0x8000008004500f, 0x0) 03:04:49 executing program 5: r0 = socket$inet(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$inet_int(r0, 0x0, 0x1000000016, &(0x7f00006ed000), &(0x7f00000000c0)=0x4) 03:04:50 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = socket(0x1000000000000001, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 03:04:50 executing program 2: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x11ffff, 0x800}, 0x18) 03:04:50 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x200000000002, 0x0) write$binfmt_elf64(r2, &(0x7f0000000500)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000240)={r0, r1}) 03:04:50 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') readv(r1, &(0x7f0000001680)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1) 03:04:51 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000000)='io.max\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f00000000c0)='io.stat\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8) 03:04:51 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x501800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 03:04:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip_mr_vif\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, &(0x7f0000000540)}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x60ff) 03:04:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="9dc2"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:04:51 executing program 3: clone(0x205, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x10008000001040, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000280)='io\x00[\xfcW\x16\x9b\xab\xeeT\xed\x16\xe3\x9ez\x8f\xe4\xb9\x00\x16\xf2f\xe3\xf60xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x10, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x47}}, &(0x7f0000000040)='GPL\x00', 0x1, 0x99, &(0x7f0000000240)=""/153}, 0x48) [ 2896.953661][T14544] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2897.010033][T14544] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2897.062025][T14544] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2897.086439][T14544] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2897.269475][T14772] netlink: 'syz-executor.2': attribute type 29 has an invalid length. 03:04:52 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4c, &(0x7f00000000c0), 0x4) [ 2897.459846][ T26] kauditd_printk_skb: 172 callbacks suppressed [ 2897.459861][ T26] audit: type=1400 audit(1552187092.747:22133): avc: denied { prog_load } for pid=14798 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:04:52 executing program 1: r0 = socket$inet6(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f000000bfc8)={0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000000080)="5500000018007fafb72d1cb2a4a280930206000000a843096c2623692500090004001000080000000000a3c728f1c46b7b31afdc1338d54400009b84136ef75afb83de448daa7227c43ab8220000e2d4ec6bab91d4", 0x55}], 0x1}, 0x0) [ 2897.586862][ T26] audit: type=1400 audit(1552187092.747:22134): avc: denied { map } for pid=14810 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:04:52 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r2, &(0x7f0000000200), 0x40000, 0x0, 0x0, 0x0) [ 2897.700007][ T26] audit: type=1400 audit(1552187092.757:22135): avc: denied { map } for pid=14810 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:04:53 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x80200, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000400)={0xe, 0x2, 0x2, 0x200, 0x7c, "558aa873d89c39808e78cd071a584eeac1acb15d95ad511564fa463dbc0102bb6c9f03838a41c3ceeecf7a9f78bdbcc0ea5efbfbd59df783a1c3201499fce9502eef4abd5a94bf32cd20c3172f50e9fe788f84ce838bd6e1c82d2a2684311cc6f24cf601877130cb6dfe8587c07d5c65fc87ed7737226e19279f627c"}, 0x88) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r2 = getpid() openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r3 = msgget(0x3, 0x20) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000240)=""/11) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000002c0)='bfs\x00', &(0x7f00000004c0)='./file1\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000500)="a04366b1e7bd60f89bcd58dfe6442bd2a80c02a421af014a8dddc4daa97731ca8ea8a07a252f5908e3f840973e8405c3492c980c981ab8597100d104ecc53bb93048b209161950b10f52642d3f9f10", 0x4f, 0x5}, {&(0x7f0000000a80)="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", 0x1000, 0x4}], 0x20000, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000180)={0x4, &(0x7f0000000000)=[{0x4, 0x5, 0x4, 0x36}, {0x80000000, 0x6, 0x7f, 0x120000000000000}, {0x10000, 0x6, 0x3, 0x5}, {0x2fe6, 0x0, 0x5, 0x2}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) [ 2897.812370][ T26] audit: type=1400 audit(1552187092.796:22136): avc: denied { map } for pid=14810 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2897.916312][ T26] audit: type=1400 audit(1552187092.806:22137): avc: denied { prog_run } for pid=14798 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 2898.039838][ T26] audit: type=1400 audit(1552187092.846:22138): avc: denied { map } for pid=14810 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:04:53 executing program 2: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x80200, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000400)={0xe, 0x2, 0x2, 0x200, 0x7c, "558aa873d89c39808e78cd071a584eeac1acb15d95ad511564fa463dbc0102bb6c9f03838a41c3ceeecf7a9f78bdbcc0ea5efbfbd59df783a1c3201499fce9502eef4abd5a94bf32cd20c3172f50e9fe788f84ce838bd6e1c82d2a2684311cc6f24cf601877130cb6dfe8587c07d5c65fc87ed7737226e19279f627c"}, 0x88) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r2 = getpid() openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r3 = msgget(0x3, 0x20) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000240)=""/11) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000002c0)='bfs\x00', &(0x7f00000004c0)='./file1\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000500)="a04366b1e7bd60f89bcd58dfe6442bd2a80c02a421af014a8dddc4daa97731ca8ea8a07a252f5908e3f840973e8405c3492c980c981ab8597100d104ecc53bb93048b209161950b10f52642d3f9f10", 0x4f, 0x5}, {&(0x7f0000000a80)="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", 0x1000, 0x4}], 0x20000, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000180)={0x4, &(0x7f0000000000)=[{0x4, 0x5, 0x4, 0x36}, {0x80000000, 0x6, 0x7f, 0x120000000000000}, {0x10000, 0x6, 0x3, 0x5}, {0x2fe6, 0x0, 0x5, 0x2}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) [ 2898.182920][ T26] audit: type=1400 audit(1552187092.856:22139): avc: denied { map } for pid=14810 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2898.370622][ T26] audit: type=1400 audit(1552187092.876:22140): avc: denied { map } for pid=14810 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2898.507403][ T26] audit: type=1400 audit(1552187092.906:22141): avc: denied { map } for pid=14810 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2898.645396][ T26] audit: type=1400 audit(1552187092.975:22142): avc: denied { map } for pid=14810 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:04:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0xc, 0x0, 0x0) mbind(&(0x7f000005d000/0x2000)=nil, 0x2000, 0x4001, &(0x7f0000000000)=0x3, 0x8, 0x0) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00900, 0x1, 0x0, 0x0, 0x2000000000002) 03:04:54 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x501800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 03:04:54 executing program 5: ioctl(0xffffffffffffffff, 0x0, 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000280)='/dev/btrfs-control\x00', 0x80200, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000400)={0xe, 0x2, 0x2, 0x200, 0x7c, "558aa873d89c39808e78cd071a584eeac1acb15d95ad511564fa463dbc0102bb6c9f03838a41c3ceeecf7a9f78bdbcc0ea5efbfbd59df783a1c3201499fce9502eef4abd5a94bf32cd20c3172f50e9fe788f84ce838bd6e1c82d2a2684311cc6f24cf601877130cb6dfe8587c07d5c65fc87ed7737226e19279f627c"}, 0x88) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r1, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r2 = getpid() openat$ipvs(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/sys/net/ipv4/vs/expire_quiescent_template\x00', 0x2, 0x0) r3 = msgget(0x3, 0x20) msgctl$MSG_INFO(r3, 0xc, &(0x7f0000000240)=""/11) sched_setscheduler(r2, 0x5, &(0x7f0000000040)) syz_mount_image$btrfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="55c4d2ffd38b0d51b15a9c3c16700893c1e31d2906b6a6f79778e1cebdf9068b02a9df9f9b2228c1a4cd4c9f52218a8777961267d5f157eb31cd8e6a4a828448b466cd963a7447655ec40fa2d4687785c21ba0c49a66b2b0465e0b9d353029086dcf88c6973e9e938692a5cbde2ddc12562a39c768a035efe8a25e05d5d56157370789"]) syz_mount_image$ntfs(0x0, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) shmget(0xffffffffffffffff, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) r4 = syz_open_dev$vcsn(&(0x7f00000007c0)='/dev/vcs#\x00', 0x0, 0x400) ioctl$sock_inet_tcp_SIOCOUTQNSD(r4, 0x894b, 0x0) syz_read_part_table(0x7fffffff, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000580)={0x0, @in={{0x2, 0x0, @loopback}}, [0x97, 0x48a7, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8340, 0x36, 0x0, 0x93d, 0x0, 0x1ff]}, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f00000002c0)='bfs\x00', &(0x7f00000004c0)='./file1\x00', 0x7, 0x2, &(0x7f0000000680)=[{&(0x7f0000000500)="a04366b1e7bd60f89bcd58dfe6442bd2a80c02a421af014a8dddc4daa97731ca8ea8a07a252f5908e3f840973e8405c3492c980c981ab8597100d104ecc53bb93048b209161950b10f52642d3f9f10", 0x4f, 0x5}, {&(0x7f0000000a80)="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", 0x1000, 0x4}], 0x20000, 0x0) socket$key(0xf, 0x3, 0x2) syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="cefaad1bb83c000000dc", 0xa}], 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PPPIOCSPASS(r4, 0x40107447, &(0x7f0000000180)={0x4, &(0x7f0000000000)=[{0x4, 0x5, 0x4, 0x36}, {0x80000000, 0x6, 0x7f, 0x120000000000000}, {0x10000, 0x6, 0x3, 0x5}, {0x2fe6, 0x0, 0x5, 0x2}]}) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/198, 0xc6}, 0x0) 03:04:54 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r2, &(0x7f0000000200), 0x40000, 0x0, 0x0, 0x0) 03:04:54 executing program 1: pipe(0x0) r0 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000000c0)='keyring\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f00000006c0)="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", 0x119) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x129001, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x18000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r2, @ANYBLOB="01042cbd7000fedbdf25110000003c0007000c000400020000000000000008000200000000000c00030063000000000000000800010007000000080001000800000008000100001000002c0006000400020008000900ff030000040002000800010027bd00000400020004000200080001007f00000050000100080003000100000044000400200001000a004e2200000008fe88000000000000000000000000010167000000200002000a004e2100010000fe8000000000000000000000000000bb02000000"], 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x44004) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f00000000c0), 0x9a, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r3, r0, r3}, &(0x7f00000009c0)=""/240, 0x4a3, 0x0) 03:04:55 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r2, &(0x7f0000000200), 0x40000, 0x0, 0x0, 0x0) 03:04:55 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x501800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 03:04:56 executing program 3: bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x840, 0x0) write$selinux_access(r0, &(0x7f0000000400)={'system_u:object_r:var_run_t:s0', 0x20, 'unconfined', 0x20, 0x5}, 0x3f) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000000140)={0x26, 'hash\x00', 0x0, 0x0, 'rmd320\x00'}, 0x58) r3 = syz_open_dev$radio(&(0x7f00000003c0)='/dev/radio#\x00', 0x1, 0x2) getsockopt$inet_mreqn(r3, 0x0, 0x23, &(0x7f0000000240)={@empty, @local}, &(0x7f0000000280)=0xc) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, 0x0, 0x0) accept4$alg(r2, 0x0, 0x0, 0x0) syz_open_dev$ndb(0x0, 0x0, 0x40000) getsockopt$EBT_SO_GET_INFO(r3, 0x0, 0x80, &(0x7f0000000040)={'filter\x00'}, &(0x7f00000000c0)=0x78) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000540)={0x3ff, 0x28, 0x1, 0xffffffffffffff9c}) ioctl(r1, 0x2, 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x140) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x1f8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext}, 0x0, 0x1, 0xffffffffffffffff, 0x4000000000000) r4 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r4, 0x0) write$tun(r4, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) socket$inet_tcp(0x2, 0x1, 0x0) r5 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x8000000, 0x0, 0x3e6, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r5) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000002c0)="ab2fb6e3fb4267e1734beb8c9a2a5565b1e6dea26b127f6379d8a1dbe03ba93e368359a098ccea7e4b6daa4ba0b10947af9dba2bbf69545b0cf22c20aa8504f055d7dd9a516833301082505972df4bfb118d96a00cb855afdd70d2caacd31ad1a2cf178c9a88a8909a3691804d92963bf177d606e2804495dec98c784d722f34079568a2559b49ed14ad5a270b0c336740ec9896b9cf4e056b1b2020fd5946592c6a5f2088ea8ab74d74935f352a35eaecf959eb52238514d3706da0d12787e9e49290ced69de47432ed77ec3e5402ff2a411ee9dccde150fad174ef021afa92b5c13b4f0ff8e2519172590aedfc005df52a0ef895cec4720e79912b111b25eb") 03:04:56 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x5}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) sendto(r2, &(0x7f0000000200), 0x40000, 0x0, 0x0, 0x0) 03:04:56 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x501800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 2901.710505][T15664] net_ratelimit: 247 callbacks suppressed [ 2901.710577][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2901.856385][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2901.884787][T15347] BFS-fs: bfs_fill_super(): loop2 is unclean, continuing [ 2901.962828][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2902.016297][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2902.051523][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2902.091997][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2902.145989][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2902.215799][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2902.284458][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available [ 2902.342890][T15664] IPVS: lblc: UDP 224.0.0.2:0 - no destination available 03:04:57 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) listen(r0, 0x1fd) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x20100, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x40, @loopback, 0x2}, 0x1c) ioctl$NBD_SET_SIZE_BLOCKS(r1, 0xab07, 0x2) syz_emit_ethernet(0xffffffffffffff91, &(0x7f0000000000)={@local, @link_local, [{[{0x9100, 0x39, 0x9}], {0x8100, 0x5, 0x81, 0x4}}], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:04:57 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x501800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 2902.526682][ T26] kauditd_printk_skb: 194 callbacks suppressed [ 2902.526697][ T26] audit: type=1400 audit(1552187097.777:22337): avc: denied { search } for pid=15730 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2902.708141][ T26] audit: type=1400 audit(1552187097.847:22338): avc: denied { search } for pid=15730 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2902.878457][ T26] audit: type=1400 audit(1552187098.124:22339): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2902.933482][ T26] audit: type=1400 audit(1552187098.124:22340): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:04:58 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x501800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) [ 2903.041508][ T26] audit: type=1400 audit(1552187098.124:22341): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:04:58 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) socket$pptp(0x18, 0x1, 0x2) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r0, &(0x7f0000000e80)={0x0, 0x0, &(0x7f0000000e40)={&(0x7f0000000080)={0x18, r1, 0x30f, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4, 0x6}]}, 0x18}}, 0x0) 03:04:58 executing program 5: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000040)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) semget$private(0x0, 0x0, 0x10) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1\x00']) chdir(&(0x7f0000000300)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') stat(&(0x7f0000000440)='./file1\x00', &(0x7f0000000640)) [ 2903.207556][ T26] audit: type=1400 audit(1552187098.174:22342): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2903.335059][ T26] audit: type=1400 audit(1552187098.174:22343): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:04:58 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000680), 0xc, &(0x7f00005a6ff0)={&(0x7f00000002c0)=@updsa={0x154, 0x1a, 0x9, 0x0, 0x0, {{@in6=@local, @in=@remote}, {@in=@dev, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2}, [@replay_esn_val={0x1c, 0x17, {0x2000000}}, @algo_auth={0x48, 0x1, {{'ghash-generic\x00'}}}]}, 0x154}}, 0x0) [ 2903.444107][ T26] audit: type=1400 audit(1552187098.412:22344): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2903.589564][ T26] audit: type=1400 audit(1552187098.432:22345): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:04:58 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5409, &(0x7f0000000140)=0x11) pipe(0x0) [ 2903.728070][ T26] audit: type=1400 audit(1552187098.472:22346): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:04:59 executing program 1: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x501800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x1ff, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) r2 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r2, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x26) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r2, &(0x7f0000005fc0), 0x80000000000006a, 0x0) 03:04:59 executing program 2: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4000000000000024, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000013e95), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0xf, 0x0, &(0x7f0000000080)) close(r1) close(r0) 03:05:00 executing program 5: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xd1, &(0x7f00000000c0), 0x4) 03:05:00 executing program 4: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffd000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 03:05:00 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cgroup.max.depth\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x20001) 03:05:00 executing program 2: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:05:00 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x80, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x40, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x8, 0x0, {0x4}, {0x0, 0x6}, @rumble={0x2}}, {0x0, 0x0, 0x0, {}, {0x0, 0x7c79}, @ramp={0x0, 0x0, {0x0, 0x0, 0x7}}}}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) r3 = fanotify_init(0x0, 0x0) timer_create(0x1, &(0x7f0000000180)={0x0, 0x3f, 0x3}, &(0x7f00000002c0)) prctl$PR_GET_NAME(0x10, 0x0) fanotify_mark(r3, 0x80, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 03:05:01 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000023000)={0x0, 0x0, &(0x7f0000023ff0)={&(0x7f0000010ec4)={0x14, 0x27, 0xaff, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 03:05:01 executing program 5: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='\x00\xf8g\xce\xa7\x00\x00\x00\x00\x00\xb2\xb2c\x86B\xf5I\'+\x8e3{\x1c\xde%\x1f\xad\x82\x94&0\x97\x0e*\xce\xd8\xf5\'\x81P\xa7\xe0\x13\x1d\xd1\x8e\xf2\xef\xc9\xa9\x03\x97.v\xc9;\x95\x8f\xb2p\xf2\xab\x05c\xea\x8f\xc9\xb9\r OYCF\x05D\xd7\xbf\xc4s\xccy\xe0\x7f\x83\nZ\xd9\xa2A\xb5\xcf\xa0\xd31\x1er\xd3\xdd\xa6\xa7\xa7\'w\x8e2\xad\xd9\xdbM\x95\xf9\xfc\x1dm\x862\x1e5Iq\xebDo0\xda\xb7\xb45\xad^\xd7\r\xbd\x88k\xbb\bL<\xea\xf4-\b]f6`\xbf{5s\xd3\x9d\x855E\x90\xb3Y\xadF\xd5&\xa9\x91\xcd\x9e?9\xcdeL\xc2\xe3\xd6\xa3*\x01\x03$Y\x9fq\xaeS\xa2\xb0\x95\bjH\xd9\x94\xc8\x81.RB\xe0{!\x1f\xb7\xec\xd4\x95\xbbl\xc7\x96\x17\xd73\x8d=\xff\x14\xaf\xf2rK+\xa4\xcd\xe09\x19q\x95r\x87\x13\xf6\xbe\x17\xb9\xa3\x9a\x18P\xcb\xb8\xdf!\xd7\f\x13b\xd0\xb3\x8c\x87\xcae') exit(0x0) getdents64(r0, &(0x7f0000000040)=""/138, 0x8a) [ 2906.187317][T16485] XFS (loop2): Invalid superblock magic number 03:05:01 executing program 4: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffd000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 03:05:01 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x201, 0x4000040001) ioctl$KVM_CREATE_VCPU(r0, 0x80045510, 0x81001c) [ 2906.838033][ C1] net_ratelimit: 269 callbacks suppressed [ 2906.838041][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2906.849642][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2906.855520][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2906.861384][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:05:02 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) epoll_create1(0x0) syz_open_dev$binder(&(0x7f0000001140)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x0, 0x0) unshare(0x400) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 03:05:02 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x80, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x40, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x8, 0x0, {0x4}, {0x0, 0x6}, @rumble={0x2}}, {0x0, 0x0, 0x0, {}, {0x0, 0x7c79}, @ramp={0x0, 0x0, {0x0, 0x0, 0x7}}}}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) r3 = fanotify_init(0x0, 0x0) timer_create(0x1, &(0x7f0000000180)={0x0, 0x3f, 0x3}, &(0x7f00000002c0)) prctl$PR_GET_NAME(0x10, 0x0) fanotify_mark(r3, 0x80, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 03:05:02 executing program 2: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:05:02 executing program 0: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) [ 2907.576096][ T26] kauditd_printk_skb: 218 callbacks suppressed [ 2907.576112][ T26] audit: type=1400 audit(1552187102.778:22565): avc: denied { map } for pid=16961 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2907.721326][ T26] audit: type=1400 audit(1552187102.837:22566): avc: denied { map } for pid=16961 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2907.805555][ T26] audit: type=1400 audit(1552187102.887:22567): avc: denied { map } for pid=16961 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:03 executing program 4: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffd000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) [ 2907.930741][ T26] audit: type=1400 audit(1552187102.887:22568): avc: denied { map } for pid=16961 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:03 executing program 3: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) [ 2908.060476][ T26] audit: type=1400 audit(1552187102.927:22569): avc: denied { map } for pid=16961 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2908.199328][ T26] audit: type=1400 audit(1552187102.927:22570): avc: denied { map } for pid=16961 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:03 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000000)=""/29, &(0x7f0000000080)=0x1d) [ 2908.399814][ T26] audit: type=1400 audit(1552187102.986:22571): avc: denied { search } for pid=16961 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:03 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x80, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x40, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x8, 0x0, {0x4}, {0x0, 0x6}, @rumble={0x2}}, {0x0, 0x0, 0x0, {}, {0x0, 0x7c79}, @ramp={0x0, 0x0, {0x0, 0x0, 0x7}}}}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) r3 = fanotify_init(0x0, 0x0) timer_create(0x1, &(0x7f0000000180)={0x0, 0x3f, 0x3}, &(0x7f00000002c0)) prctl$PR_GET_NAME(0x10, 0x0) fanotify_mark(r3, 0x80, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) [ 2908.580795][ T26] audit: type=1400 audit(1552187102.996:22572): avc: denied { search } for pid=16961 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2908.716635][ T26] audit: type=1400 audit(1552187103.006:22573): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2908.775840][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2908.782112][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2908.789028][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2908.794936][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2908.802370][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2908.808429][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:05:04 executing program 0: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) [ 2908.939210][ T26] audit: type=1400 audit(1552187103.006:22574): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2908.962794][T17426] IPVS: length: 29 != 24 03:05:04 executing program 2: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:05:04 executing program 4: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$l2tp(0x18, 0x1, 0x1) prctl$PR_SET_MM(0x23, 0x7, &(0x7f0000ffd000/0x2000)=nil) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) 03:05:04 executing program 5: get_mempolicy(0x0, &(0x7f0000000080), 0x80000001, &(0x7f0000735000/0x2000)=nil, 0x3) 03:05:05 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, 0x0, 0x80, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) sendto$inet(r0, 0x0, 0x0, 0x40, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) connect$bt_l2cap(r2, &(0x7f0000000080)={0x1f, 0x0, {0x700, 0x0, 0x2, 0x0, 0x6}, 0x300000000000000}, 0xe) ioctl$UI_BEGIN_FF_UPLOAD(0xffffffffffffffff, 0xc06855c8, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x8, 0x0, {0x4}, {0x0, 0x6}, @rumble={0x2}}, {0x0, 0x0, 0x0, {}, {0x0, 0x7c79}, @ramp={0x0, 0x0, {0x0, 0x0, 0x7}}}}) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000340)) r3 = fanotify_init(0x0, 0x0) timer_create(0x1, &(0x7f0000000180)={0x0, 0x3f, 0x3}, &(0x7f00000002c0)) prctl$PR_GET_NAME(0x10, 0x0) fanotify_mark(r3, 0x80, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x0) 03:05:05 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={0x0, 0xfffffe66, &(0x7f0000000180)={&(0x7f0000000000)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa, 0x14}]}, 0x125}}, 0x0) 03:05:05 executing program 3: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:05:05 executing program 0: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) [ 2910.689466][T17866] XFS (loop2): Invalid superblock magic number 03:05:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$can_bcm(0xffffffffffffffff, 0x0, 0x0) fstat(0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) fstat(0xffffffffffffffff, &(0x7f0000000300)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000380)={{{@in6=@mcast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@empty}}, &(0x7f0000000580)=0xffffffee) setreuid(0x0, r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8991, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_UCAS_UNMAP(0xffffffffffffffff, 0x4018ae51, 0x0) userfaultfd(0x0) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000240)={'bond0\x00\x00\x00\n\x00!!\x00\x01T*', @ifru_names='bond_slave_1\x00'}) 03:05:06 executing program 2: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:05:06 executing program 1: openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, 0x0, &(0x7f0000000140)) r1 = memfd_create(&(0x7f0000000580)='/dev/binder#\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf10001, 0xeffffdef) 03:05:06 executing program 5: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000400)='/dev/md0\x00', 0x20000, 0x0) ioctl$BLKPG(r0, 0x40140921, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) unshare(0x8020000) semget$private(0x0, 0x0, 0x0) semop(0x0, &(0x7f0000000080)=[{0x0, 0x0, 0x1800}], 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) setsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000280)=0x400, 0x4) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, &(0x7f00000002c0), &(0x7f0000000300)=0x4) ioctl$VIDIOC_PREPARE_BUF(r3, 0xc058565d, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x4000, {0x77359400}, {0x0, 0xd, 0x0, 0x200, 0x8, 0x0, "4d02c46e"}, 0x0, 0x0, @userptr, 0x4}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'veth0_to_team\x00', 0x1002}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000140)='lo\x00\x96o\xd6Q\xb9Y\xa9\xc8J,\x00\xd2\x97\x06\x00\xdc\r') openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) [ 2911.774451][T18349] bond0: Releasing backup interface bond_slave_1 03:05:07 executing program 0: r0 = socket$kcm(0xa, 0x122000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f0000000140)={&(0x7f0000003840)=@nl=@unspec={0x0, 0x0, 0x0, 0x80fe}, 0x80, &(0x7f0000000340)=[{&(0x7f00000037c0)="d90d0000768606681d012f629c75adfa4208d5febf524a024aface6a6ac7d846ed2fa163e15ffb5033e9ad60d7a8a295b90bf9cc8578ec03a10c48d401050b0a2f858ad2c4aa592d", 0x48}], 0x1}, 0x0) 03:05:07 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000415fc8)={&(0x7f000034c000), 0xc, &(0x7f00000daff0)={&(0x7f0000417e08)=@newsa={0x13c, 0x10, 0x203, 0x0, 0x0, {{@in, @in=@multicast1}, {@in6=@loopback, 0x0, 0x33}, @in=@remote={0xac, 0x14, 0xffffffffffffffff}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'cmac(aes)\x00'}, 0x0, 0xb000000}}]}, 0x13c}}, 0x0) 03:05:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000180)={{}, {0x20000000304, @link_local}, 0x0, {0x2, 0x0, @local}, '\x00\x00\x00\x00\x01\x00\x00\x01\x00'}) [ 2912.629904][ T26] kauditd_printk_skb: 207 callbacks suppressed [ 2912.629919][ T26] audit: type=1400 audit(1552187107.798:22782): avc: denied { map } for pid=18654 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2912.838105][ T26] audit: type=1400 audit(1552187107.858:22784): avc: denied { map } for pid=18654 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:08 executing program 3: syz_open_dev$dspn(0x0, 0x4, 0x40) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) getrandom(0x0, 0x0, 0x37fd7cd92788a310) r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$cec(0xfffffffffffffffe, 0x2, 0x2) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) syz_open_dev$sndpcmc(&(0x7f00000002c0)='/dev/snd/pcmC#D#c\x00', 0x2, 0x8041) r1 = shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x0) shmdt(r1) socketpair$unix(0x1, 0x0, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000080)={0x2, 'ipddp0\x00', 0x3}, 0x18) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000180)='./file0\x00', 0x7f, 0x0, &(0x7f0000000340), 0x800, 0x0) 03:05:08 executing program 5: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000000)={0x0, 0x0, r0}) [ 2913.029587][ T26] audit: type=1400 audit(1552187107.848:22783): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:08 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$int_in(r0, 0x800000c0045005, &(0x7f0000003ff8)=0x1000) [ 2913.154786][ T26] audit: type=1400 audit(1552187107.878:22785): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:08 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f0000000180)='.\x00', 0x8000000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000001c0)=0x9) getdents64(r1, &(0x7f0000000100)=""/79, 0x2b7) lseek(0xffffffffffffffff, 0xfffffffffffffffc, 0x0) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000080)=""/40, &(0x7f0000001000)=0x28) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x0) setsockopt$RDS_RECVERR(0xffffffffffffffff, 0x114, 0x5, &(0x7f0000000380)=0x1, 0x4) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r3, 0xc0505510, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000001000)=ANY=[@ANYBLOB="b700000005ed0050bfa30000000000000703000031feffff7a0af0fff8ffffff71a4f0ff00000000b7060000000000012d400500000000005504000001ed00001d040000000000002c460000000000006b0a00fe000000008500000007000000b7000000000000009500000000000000"], 0x0}, 0x48) exit(0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mq_timedreceive(r4, &(0x7f0000000200)=""/97, 0x61, 0x400, &(0x7f00000000c0)={0x0, 0x989680}) getdents(r1, 0x0, 0x0) 03:05:08 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0xffffffffffffff63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) capget(&(0x7f00000001c0)={0x20080522, r0}, &(0x7f0000000200)={0x9, 0x81}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r2 = semget(0x3, 0x1, 0x100) semtimedop(r2, &(0x7f0000000180)=[{}, {0x3, 0x9, 0x800}, {0x7, 0x3418, 0x1000}, {0x3, 0x9, 0x800}, {0x1, 0xfffffffffffeffff, 0x1800}], 0x5, &(0x7f0000000240)) [ 2913.317252][ T26] audit: type=1400 audit(1552187107.908:22786): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 2913.466678][ T26] audit: type=1400 audit(1552187107.918:22787): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2913.543893][ T26] audit: type=1400 audit(1552187107.918:22788): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:08 executing program 5: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000000c0)="2f0000001800030007fffd946fa283bc8020000000040005031d85680c0009000700000016ccbb24e0710b42fa3ccc", 0x2f}], 0x1}, 0x0) [ 2913.688399][ T26] audit: type=1400 audit(1552187107.918:22789): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:08 executing program 0: syz_open_procfs(0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000640)={{{@in=@multicast1, @in6=@ipv4}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, 0x0) lstat(0x0, &(0x7f0000000740)) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='.//ile0\x00', &(0x7f0000000340)='fuseblk\x00', 0x8, &(0x7f0000000800)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x800}}]}}) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000280)='.//ile0\x00', &(0x7f0000000440)='security.selinux\x00', &(0x7f0000000480)='system_u:object_r:smartcard_device_t:s0\x00', 0x28, 0x0) renameat(r0, &(0x7f0000000240)='.//ile0\x00', r0, &(0x7f00000007c0)='./file0/f.le.\x00') [ 2913.850497][ T26] audit: type=1400 audit(1552187107.937:22790): avc: denied { search } for pid=18654 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2913.957824][ T26] audit: type=1400 audit(1552187107.947:22791): avc: denied { search } for pid=18654 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2914.107875][T18949] IPv6: NLM_F_CREATE should be specified when creating new route 03:05:09 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x5) ioctl$TIOCSSOFTCAR(r0, 0x5437, 0x0) 03:05:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 03:05:10 executing program 5: socketpair$unix(0x1, 0x800000000000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x200000000058fe4}]}) [ 2915.060592][ C0] net_ratelimit: 1 callbacks suppressed [ 2915.060600][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2915.072014][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2915.077865][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2915.083675][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2915.089490][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2915.095282][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:05:10 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0xffffffffffffff63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) capget(&(0x7f00000001c0)={0x20080522, r0}, &(0x7f0000000200)={0x9, 0x81}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r2 = semget(0x3, 0x1, 0x100) semtimedop(r2, &(0x7f0000000180)=[{}, {0x3, 0x9, 0x800}, {0x7, 0x3418, 0x1000}, {0x3, 0x9, 0x800}, {0x1, 0xfffffffffffeffff, 0x1800}], 0x5, &(0x7f0000000240)) [ 2915.222111][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2915.227931][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2915.233834][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2915.239604][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:05:10 executing program 3: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000680)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000000)={{}, 'syz0\x00'}) ioctl$UI_DEV_CREATE(r0, 0x5501) 03:05:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000003fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r2, 0x8927, &(0x7f0000000000)={'vxcan1\x00', 0x0}) close(r2) close(r1) 03:05:11 executing program 1: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) r0 = open$dir(&(0x7f00004daff8)='./file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdir(&(0x7f00000002c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r1, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') renameat2(r1, &(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x5) 03:05:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) 03:05:11 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0xffffffffffffff63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) capget(&(0x7f00000001c0)={0x20080522, r0}, &(0x7f0000000200)={0x9, 0x81}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r2 = semget(0x3, 0x1, 0x100) semtimedop(r2, &(0x7f0000000180)=[{}, {0x3, 0x9, 0x800}, {0x7, 0x3418, 0x1000}, {0x3, 0x9, 0x800}, {0x1, 0xfffffffffffeffff, 0x1800}], 0x5, &(0x7f0000000240)) 03:05:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x860, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) getegid() openat$pfkey(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/net/pfkey\x00', 0x40100, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) geteuid() openat$vicodec1(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x9, 0x52, 0x3, 0x400000bff}, 0x2c) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) getpgrp(0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) gettid() sendmmsg$unix(r2, &(0x7f0000007580)=[{0x0, 0x0, &(0x7f00000074c0)=[{0x0}], 0x1, 0x0, 0x0, 0x800}], 0x1, 0x40) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) r5 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x0, 0x0) ioctl$RTC_WKALM_RD(r2, 0x80287010, &(0x7f0000000500)) syz_kvm_setup_cpu$x86(r5, r4, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:05:12 executing program 1: openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) pipe(0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_MCE_KILL(0x21, 0x0, 0x0) r1 = getpid() write$FUSE_OPEN(r0, 0x0, 0x0) sched_setscheduler(r1, 0x5, 0x0) r2 = socket$pptp(0x18, 0x1, 0x2) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) dup2(r3, r2) request_key(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0) 03:05:12 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) close(r0) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x8e, 0x2001) r1 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ftruncate(r1, 0x2008000) sendfile(r0, r1, 0x0, 0x80000000000d) 03:05:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)="2e00000018008100e00f80ecdb4cb92e0a480e181e0cd300e8bd6efb120008000e0010000000000002de00000000", 0x2e}], 0x1}, 0x0) [ 2917.685821][ T26] kauditd_printk_skb: 229 callbacks suppressed [ 2917.685837][ T26] audit: type=1400 audit(1552187112.809:23021): avc: denied { map } for pid=19953 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2917.828485][ T26] audit: type=1400 audit(1552187112.849:23022): avc: denied { search } for pid=19942 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:13 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000580007031dfffd946f610500070000001d0088a8ffff0000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000013000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 2918.019245][ T26] audit: type=1400 audit(1552187112.879:23023): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2918.153793][ T26] audit: type=1400 audit(1552187112.879:23024): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2918.303803][ T26] audit: type=1400 audit(1552187112.898:23026): avc: denied { map } for pid=19953 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:13 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) setsockopt$inet6_int(r0, 0x29, 0xb, &(0x7f0000000000)=0x6, 0x4) listen(r0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) 03:05:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b, 0xfd6b36d1aa000000}, 0x100) [ 2918.443461][ T26] audit: type=1400 audit(1552187112.898:23027): avc: denied { map } for pid=19953 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2918.603396][ T26] audit: type=1400 audit(1552187112.888:23025): avc: denied { map_create } for pid=19966 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:05:13 executing program 4: perf_event_open(&(0x7f00000004c0)={0x0, 0xffffffffffffff63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cpuset.effective_mems\x00', 0x0, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x1, 0x4) capget(&(0x7f00000001c0)={0x20080522, r0}, &(0x7f0000000200)={0x9, 0x81}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000d83ff8), 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x48}}, 0x0) r2 = semget(0x3, 0x1, 0x100) semtimedop(r2, &(0x7f0000000180)=[{}, {0x3, 0x9, 0x800}, {0x7, 0x3418, 0x1000}, {0x3, 0x9, 0x800}, {0x1, 0xfffffffffffeffff, 0x1800}], 0x5, &(0x7f0000000240)) [ 2918.740460][ T26] audit: type=1400 audit(1552187112.908:23028): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2918.857277][ T26] audit: type=1400 audit(1552187112.928:23029): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:14 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x80000001) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f00000001c0)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) close(r2) ioctl$KVM_GET_DIRTY_LOG(0xffffffffffffffff, 0xc018aec0, 0x0) [ 2918.976155][ T26] audit: type=1400 audit(1552187112.958:23030): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2919.150350][T20431] IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration 03:05:14 executing program 2: r0 = socket$tipc(0x1e, 0x4, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000200)={0x41}, 0x10) bind$tipc(r0, 0x0, 0x0) sendmsg$tipc(r0, &(0x7f0000000080)={&(0x7f00000000c0), 0x10, 0x0}, 0x0) [ 2919.288384][T20451] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.3'. [ 2919.355518][T20451] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 03:05:14 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = syz_open_dev$binder(&(0x7f00000003c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0046209, 0x0) 03:05:15 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f, 0x1000}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000100)={0x12, 0x10, 0xfa00, {&(0x7f0000000000), 0xffffffffffffffff, r0}}, 0x18) 03:05:15 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r1 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e20}, 0x1b) listen(r1, 0x0) syz_emit_ethernet(0x74, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x4e20, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}, 0x0) 03:05:15 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 03:05:15 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000000)='./file0\x00') fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 03:05:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x3, 0x800000000000b) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000040)=@nat={'nat\x00', 0x19, 0x1, 0x1a0, [0x20000380, 0x0, 0x0, 0x200003b0, 0x200003e0], 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000001000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000006000000000000000000000000000000000000000000000000ffffffff01000000110000000000000000000300736630000010000000000000000064756d6d79300000000000000000000069666230000000000000000f000000006c6f0000000000000000000000000000ffffffffffff000000000000ffffffffffff000000000000000070000000a8000000e0000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000aaaaaaaaaa000000fcffffff00000000736e6174000000000000000000000000000000000000000000000000000000001000000000000000ffffffffffff0000fdffffff00000000"]}, 0x218) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f00000000c0)=@nat={'nat\x00\x00\x00\x00\x00\x00\x00\x03\x00', 0x19, 0x1, 0x178, [0x200003c0, 0x0, 0x0, 0x200003f0, 0x20000420], 0x0, 0x0, &(0x7f00000003c0)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x3, 0x0, 0x800, 'ifb0\x00', 'dummy0\x00', 'ip_vti0\x00', 'ip6tnl0\x00', @remote, [], @link_local, [], 0xb8, 0xb8, 0xe8, [@ip={'ip\x00', 0x20, {{@loopback, @dev, 0x0, 0x0, 0x0, 0x84, 0x10}}}]}}, @common=@AUDIT={'AUDIT\x00', 0x8}}]}]}, 0x1f0) 03:05:16 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) close(r0) socket$pppoe(0x18, 0x1, 0x0) io_setup(0x2005, &(0x7f0000000100)=0x0) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, 0x0}]) [ 2920.883975][T21091] net_ratelimit: 3 callbacks suppressed [ 2920.883988][T21091] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 03:05:16 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000013000)={0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000004ff0)={0x2, &(0x7f0000000000)=[{0x1d, 0x0, 0x4000000000401}, {}]}, 0x10) 03:05:16 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f00000000c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$adsp(0x0, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) mremap(&(0x7f0000fed000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffd000/0x1000)=nil) syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockname$packet(0xffffffffffffffff, 0x0, 0x0) 03:05:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f000079c000/0x800000)=nil, 0x800000, 0xc) sigaltstack(&(0x7f0000b17000/0x3000)=nil, 0x0) madvise(&(0x7f00002f8000/0xc00000)=nil, 0xc00000, 0xd) [ 2921.284130][T21142] Process accounting resumed 03:05:16 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x7, 0x4, 0x1400, 0x5, 0x40000000024, 0xffffffffffffffff, 0x0, [0x25f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000]}, 0x2c) [ 2921.696070][T21118] Process accounting resumed 03:05:16 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000000)='./file0\x00') fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 03:05:17 executing program 2: r0 = socket(0x11, 0x803, 0x300) r1 = socket$inet(0x2, 0x80003, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") sendto$inet(r1, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10) recvmmsg(r0, &(0x7f0000002e00), 0x386, 0x0, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) 03:05:17 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000000)={'bpq0\x00', @ifru_names='\x00\x00\x92\x00'}) 03:05:17 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x8b34, &(0x7f0000000000)='wlan0\x00\xd3\xeb\'\xe4\xd5\xd1s\b\x8c\xba\x00\x00@\x00\x00\x00\x00\x00(\x00\x00\x00 \x1cs\n\xcc]\xfb\xe9i]\xb9\xfc\xae\xd03\x00\x00\x00\x00\x00\x00\x00\b\xb4\x8f\x03\x00\x00\xf6L\x00\x00\xd5\x98\xba\xc4n\xd4\xf3(eq]\x812\xc3\x8e\x88\x00\x00\x00\x00\x00\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 03:05:17 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x2000000008}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e1f, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000002c0), 0x400000000000027, 0x0) [ 2922.674188][T21572] Process accounting resumed 03:05:17 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000000)='./file0\x00') fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) [ 2922.751734][ T26] kauditd_printk_skb: 210 callbacks suppressed [ 2922.751749][ T26] audit: type=1400 audit(1552187117.840:23241): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:17 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") fcntl$setstatus(r0, 0x4, 0x2000) [ 2922.880395][ T26] audit: type=1400 audit(1552187117.840:23242): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2923.033857][ T26] audit: type=1400 audit(1552187118.117:23243): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2923.154970][ T26] audit: type=1400 audit(1552187118.137:23244): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2923.223196][ T26] audit: type=1400 audit(1552187118.137:23245): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2923.337115][ T26] audit: type=1400 audit(1552187118.286:23246): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2923.424695][ T26] audit: type=1400 audit(1552187118.286:23247): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2923.472805][T21705] Process accounting resumed [ 2923.525141][ T26] audit: type=1400 audit(1552187118.306:23248): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2923.617528][ T26] audit: type=1400 audit(1552187118.306:23249): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:18 executing program 3: prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x2000)=nil) r0 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, 0x0, 0x0) perf_event_open(&(0x7f0000001000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r0, 0xc1105517, &(0x7f0000001000)) 03:05:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x101801, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYRESHEX=0x0], 0xfffffe6a) poll(&(0x7f0000000180)=[{r0}], 0x1, 0x0) 03:05:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x80000000007, 0x1000000040000001) ioctl$FS_IOC_FSGETXATTR(r1, 0x80045518, 0x0) 03:05:18 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bind$rds(r0, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001f40)={&(0x7f0000000080)={0x2, 0x0, @rand_addr=0x5}, 0x10, 0x0, 0x0, &(0x7f0000001e80)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000001b40)=[{&(0x7f0000001ac0)=""/88, 0x58}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, 0x0, 0x40000}}], 0x90}, 0x0) 03:05:18 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x8040, 0x0) acct(&(0x7f0000000000)='./file0\x00') fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 03:05:18 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") fcntl$setstatus(r0, 0x4, 0x2000) [ 2923.786693][ T26] audit: type=1400 audit(1552187118.375:23250): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2924.202741][T21786] Process accounting resumed 03:05:19 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x400000000000000, 0xffffffffffffffff) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$UFFDIO_WAKE(r1, 0x8010aa02, &(0x7f0000000380)={&(0x7f0000be1000/0x2000)=nil, 0x2000}) shmget$private(0x0, 0x1000, 0x8, &(0x7f0000fff000/0x1000)=nil) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f00002ec000/0x200000)=nil, 0x200000, 0x0, 0x0, 0x0) ioctl$EVIOCSCLOCKID(0xffffffffffffffff, 0x400445a0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0)}}, 0x20) readv(0xffffffffffffffff, &(0x7f0000001900)=[{&(0x7f0000000680)=""/235, 0xeb}, {0x0}, {&(0x7f0000000500)=""/3, 0x3}], 0x3) ioctl$UI_SET_FFBIT(r1, 0x4004556b, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280)={0x0, 0x4}, &(0x7f00000002c0)=0x8) r3 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x40003) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000480)={r2, 0x8000}, 0x0) mmap$binder(&(0x7f00009ea000/0x2000)=nil, 0x2000, 0xfffffefffffffffd, 0x200000000000010, 0xffffffffffffffff, 0x0) fremovexattr(0xffffffffffffffff, &(0x7f0000000000)=@random={'os2.', '/dev/input/mice\x00'}) ioctl$VHOST_SET_LOG_FD(r3, 0x4004af07, &(0x7f0000001980)=r3) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, &(0x7f0000000340), &(0x7f0000000640)=0xc) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x16) openat$ion(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = geteuid() r5 = getegid() fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)='fuse\x00', 0x1000000, &(0x7f0000000780)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}], [{@euid_eq={'euid', 0x3d, r6}}, {@euid_eq={'euid', 0x3d, r7}}]}}) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000540)=0x8) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f0000001a00)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000100)={0x0, 0xffffffffffffffff}, &(0x7f0000000040)=0x8) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x1, 0x2000000000002) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) 03:05:19 executing program 5: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) io_pgetevents(0x0, 0x1, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 03:05:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd2(0x0, 0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000000080)={0x0, 0x0, 0x2, r3, 0x3}) 03:05:19 executing program 0: seccomp(0x0, 0x0, 0x0) accept$alg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x14, r1, 0x201, 0x0, 0x0, {0x5}}, 0x14}}, 0x0) 03:05:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") fcntl$setstatus(r0, 0x4, 0x2000) 03:05:20 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") fcntl$setstatus(r0, 0x4, 0x2000) 03:05:21 executing program 4: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) io_pgetevents(0x0, 0x1, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 03:05:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'veth1_to_bridge\x00', &(0x7f0000000000)=@ethtool_gfeatures}) 03:05:21 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x25}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x252, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000100)) 03:05:21 executing program 1: clone(0x4010003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) ptrace$cont(0x18, r0, 0x0, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 03:05:21 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x9, 0x3, &(0x7f00000000c0)=@framed, &(0x7f0000000140)='GPL\x00', 0x6f1a, 0xfb, &(0x7f00000003c0)=""/251, 0x0, 0x0, [], 0x0, 0xd}, 0x48) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000040)={r1, r0, 0xd}, 0x10) 03:05:21 executing program 5: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) io_pgetevents(0x0, 0x1, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 03:05:21 executing program 5: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) io_pgetevents(0x0, 0x1, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 03:05:21 executing program 4: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) io_pgetevents(0x0, 0x1, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 03:05:21 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0xc, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, 0x20) 03:05:21 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.controllers\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000240)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0xfff) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0xffffffe4, 0x0, 0x41}) 03:05:21 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x181) r1 = memfd_create(&(0x7f0000000580)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, 0x0, 0x800000000000de) 03:05:22 executing program 5: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) io_pgetevents(0x0, 0x1, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 03:05:22 executing program 4: getsockopt$ax25_int(0xffffffffffffffff, 0x101, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/loop-control\x00', 0x2000, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) io_pgetevents(0x0, 0x1, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x1c9c380}, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r3 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(r2, 0x4c80, r3) 03:05:22 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10b, 0x6, 0x209e1e, 0x0, 0x1}, 0x2c) r0 = creat(&(0x7f0000000640)='./file0\x00', 0x100) unlink(&(0x7f0000000940)='./file0\x00') r1 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, 0x0) accept$inet6(r0, &(0x7f0000001380)={0xa, 0x0, 0x0, @ipv4}, &(0x7f00000013c0)=0x1c) shutdown(0xffffffffffffffff, 0x1) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e22, @multicast2}}, 0xffffffff, 0x7}, &(0x7f0000001280)=0x90) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000012c0)={r2, 0x58, "4b956704f766e1d5df0b998a0ea0513adfec2e94f02d76f1eb1c72c85da2d23caac00ef45a9145070082053efaf3478d8322e332423102565c17c037313a28539f175430649f2688cc7818b30a94efa8070503d7d35da224"}, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x60000000, &(0x7f00000003c0)}) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip6_tables_targets\x00') preadv(r3, &(0x7f0000001240)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1, 0x400000000000) 03:05:22 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x10, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1, 0x18}]}, &(0x7f0000000080)='GPL\x00'}, 0x48) 03:05:22 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x1, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000280)='/dev/snd/pcmC#D#p\x00', 0xffff, 0x8000) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f00000002c0)=0x3, 0x4) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f00000001c0)={{0x1}, 0x0, 0x0, 0x4}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) mount(&(0x7f00000004c0)=ANY=[], &(0x7f000000aff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000007c0)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x100000000000009) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000001000)='./file0\x00', &(0x7f0000000080)='./file0\x00') clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) umount2(&(0x7f0000000000)='./file0\x00', 0x0) creat(&(0x7f0000000200)='./bus\x00', 0x0) ftruncate(0xffffffffffffffff, 0x8200) poll(&(0x7f00000003c0)=[{}, {}, {}, {}], 0x4, 0x35ba) execve(&(0x7f0000000380)='./bus\x00', &(0x7f00000003c0), 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00004ca000)={&(0x7f0000000040)=ANY=[@ANYBLOB]}}, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='mounts\x00') 03:05:22 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_S_DV_TIMINGS(r0, 0xc0845657, 0x0) 03:05:22 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) openat$nullb(0xffffffffffffff9c, 0x0, 0x121041, 0x0) clock_settime(0x0, &(0x7f00000002c0)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, 0x0) fchown(r0, r3, 0x0) getxattr(0x0, &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x0, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x6, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x401, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x9, 0x7f}, 0x0, 0x7, r1, 0x8) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x14) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200000, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/73, 0x49, 0x2060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f00000001c0)) 03:05:22 executing program 4: socket$vsock_stream(0x28, 0x1, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 2927.832186][ T26] kauditd_printk_skb: 187 callbacks suppressed [ 2927.832200][ T26] audit: type=1400 audit(1552187122.880:23438): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2927.965483][ T26] audit: type=1400 audit(1552187122.910:23439): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2928.122363][ T26] audit: type=1400 audit(1552187122.910:23440): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2928.275202][ T26] audit: type=1400 audit(1552187122.959:23441): avc: denied { map } for pid=22960 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0xa6, 0xffff8000}) [ 2928.424313][ T26] audit: type=1400 audit(1552187122.959:23442): avc: denied { map } for pid=22960 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00005befdc)) r1 = syz_open_pts(r0, 0x20201) fcntl$setstatus(r1, 0x4, 0x2800) ioctl$TCXONC(r1, 0x540a, 0x0) write(r1, &(0x7f0000fd6000)='z', 0x1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x19) ioctl$TCFLSH(r0, 0x540b, 0x0) [ 2928.643208][ T26] audit: type=1400 audit(1552187122.969:23443): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2928.781848][ T26] audit: type=1400 audit(1552187122.969:23444): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2928.880375][ T26] audit: type=1400 audit(1552187122.989:23445): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2928.987101][ T26] audit: type=1400 audit(1552187123.019:23446): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2929.095499][ T26] audit: type=1400 audit(1552187123.049:23447): avc: denied { map } for pid=22960 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:24 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) openat$nullb(0xffffffffffffff9c, 0x0, 0x121041, 0x0) clock_settime(0x0, &(0x7f00000002c0)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, 0x0) fchown(r0, r3, 0x0) getxattr(0x0, &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x0, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x6, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x401, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x9, 0x7f}, 0x0, 0x7, r1, 0x8) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x14) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200000, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/73, 0x49, 0x2060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f00000001c0)) 03:05:24 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000680)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000480)={0x28, 0x2}, 0x28) 03:05:24 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x5, 0x10040) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000240)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r1, 0x6, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, r3}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r4, 0x110, 0x2, &(0x7f0000000100)='xfs\x00', 0x4) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r6 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7f, 0x102) write$P9_RREADDIR(r6, &(0x7f0000000280)={0x49, 0x29, 0x1, {0x3, [{{0x0, 0x2, 0x5}, 0x0, 0x81, 0x7, './file0'}, {{0x8, 0x3, 0x3}, 0x10000, 0x0, 0x7, './file1'}]}}, 0x49) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r5, 0x7001) ioctl$RTC_AIE_OFF(r5, 0x7002) 03:05:24 executing program 0: r0 = memfd_create(&(0x7f00000001c0)='dev \xb7J\x11U\xdf\x90\xbfB\xb9\x18\xad\x84\xbd\x97\xf6\xb0\x96\x8b\xa4\x13\xdb\xeb\'X`\xe45\xe3\xa7\xe4\x7fK\xec-\x10t\b[y\x99\xf4\x06\x1f\x8f\xf9\xb7\xd7\x92\xd5D\xcf[x\x17\"s\xed\xe7\x15\xfc\x85r\xe2\xa5\xa4\x99\x11\x89\xeaC\xab\xf6\x84\xd0\xf2E\x12\xe8\x9d\xd4oY\xa06}\xa0p\xe5\xda\x98\x19L1\xe6!\xeeq\x9eq\x9a?\xe3yD\x11\x121\xc3\xa0&\xa3=\xcc\xdf\x88l\xcd33\xee\x97^\xec\xfe\xac\x19\xa0\x9c>\xd20\xa1\xc6', 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000080)={{}, {}, [{}]}, 0x2c, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='system.posix_acl_access\x00', 0x0, 0xffffffffffffffa0) 03:05:24 executing program 3: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x4800000c004500a, &(0x7f0000000080)) ioctl$int_in(r0, 0x800000c004500a, &(0x7f0000000040)) 03:05:24 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c02, &(0x7f0000000200)) 03:05:25 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x5, 0x10040) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000240)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r1, 0x6, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, r3}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r4, 0x110, 0x2, &(0x7f0000000100)='xfs\x00', 0x4) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r6 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7f, 0x102) write$P9_RREADDIR(r6, &(0x7f0000000280)={0x49, 0x29, 0x1, {0x3, [{{0x0, 0x2, 0x5}, 0x0, 0x81, 0x7, './file0'}, {{0x8, 0x3, 0x3}, 0x10000, 0x0, 0x7, './file1'}]}}, 0x49) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r5, 0x7001) ioctl$RTC_AIE_OFF(r5, 0x7002) 03:05:25 executing program 5: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2f, 0x0, @remote={0xac, 0x223}, @dev}, @icmp=@parameter_prob={0x4, 0x3, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x223}, @dev}}}}}}, 0x0) 03:05:25 executing program 4: r0 = eventfd(0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) poll(&(0x7f0000000240)=[{r0}], 0x1, 0xe1) read$eventfd(r0, &(0x7f0000000040), 0xfffffcc6) 03:05:25 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="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"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) openat$nullb(0xffffffffffffff9c, 0x0, 0x121041, 0x0) clock_settime(0x0, &(0x7f00000002c0)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, 0x0) fchown(r0, r3, 0x0) getxattr(0x0, &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x0, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x6, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x401, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x9, 0x7f}, 0x0, 0x7, r1, 0x8) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x14) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200000, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/73, 0x49, 0x2060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f00000001c0)) 03:05:25 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000001640)={0x3, 0x0, [{0x0, 0x0, 0x0}, {0x100000, 0x0, 0x0}, {0xf002, 0x0, 0x0}]}) ioctl$VHOST_RESET_OWNER(r0, 0xaf02, 0x0) 03:05:26 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca01000000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x9e945000, 0x3e0000}], 0x0) 03:05:26 executing program 0: mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::b:\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x6, 0x2000) openat$cgroup_subtree(r0, &(0x7f0000000140)='cgroup.subtree_control\x00', 0x2, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x34) socket$packet(0x11, 0x3, 0x300) wait4(0x0, 0x0, 0x0, 0x0) 03:05:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x3000)=nil) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ff7000/0x9000)=nil, 0x9000, 0x4) 03:05:26 executing program 1: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000740)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r2, 0x0, 0x60, &(0x7f0000002000)=ANY=[@ANYBLOB="ffffffff00000001ffffff00ffffffff0180c200000000000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffff00ffff00000000000000000000000007e41f0862007fffff000276657468310000000000000000000000766c616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000000000b0100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007fffe00000020f00000000000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000ffff00ff000000000000000000000000000000000000000000000000000000000000000000000000ff00ff00ff00000000000000000000fff8000100010000000400016272696467655f736c6176655f31000076657468305f746f5f626f6e6400000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000000100000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000000000000000e0000002ffffffff0f0000000000000000002d0300000000ffffffff00000000aaaaaaaaaa00000000000000000000000000000000000000ff0000ffff0000000000000000000000aaaaaaaaaabb0000000000000000000000000000000000000000ffffff000000000000000000000000060000054f58420002003f79616d300000000000000000000000007663616e30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff0000000000000000000000000000000000010000000000000000000000f000200100000000000000000000000000000000000000000000000000003000434f4e4e4d41524b00000000000000000000000000000000000000000001090000000300000000000080030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e80000000000000000000000000000000000000000000000000028000000"], 0x1) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000540)='tls\x00', 0x4) openat$nullb(0xffffffffffffff9c, 0x0, 0x121041, 0x0) clock_settime(0x0, &(0x7f00000002c0)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(0x0, 0x0) fchown(r0, r3, 0x0) getxattr(0x0, &(0x7f0000000340)=@known='security.capability\x00', &(0x7f0000000380)=""/88, 0x58) perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0x2, 0x0, 0x80, 0xffffffffffffffe0, 0x0, 0x6997, 0x0, 0x0, 0x3, 0x8, 0x8, 0x1f, 0xfffffffffffffcd1, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7f, 0x0, 0x6, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0xee, 0x0, 0xffffffffffffffff, 0xe, 0x0, 0x200, 0x1, 0x0, 0x401, 0x0, @perf_config_ext={0x0, 0x7}, 0x0, 0x5, 0xfffffffffffffffb, 0x6, 0x0, 0x9, 0x7f}, 0x0, 0x7, r1, 0x8) mkdir(&(0x7f00000009c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000500)={0x0, 0xffffffffffffffff, 0x3, 0x1}, 0x14) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) connect$tipc(0xffffffffffffffff, 0x0, 0x0) rename(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000040)='./file0\x00') mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000780)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001000), 0x1000) umount2(&(0x7f00000004c0)='./file0\x00', 0x3) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x200000, 0x0) recvfrom$unix(r4, &(0x7f0000000200)=""/73, 0x49, 0x2060, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f00000001c0)) 03:05:26 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x5, 0x10040) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000240)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r1, 0x6, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, r3}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r4, 0x110, 0x2, &(0x7f0000000100)='xfs\x00', 0x4) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r6 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7f, 0x102) write$P9_RREADDIR(r6, &(0x7f0000000280)={0x49, 0x29, 0x1, {0x3, [{{0x0, 0x2, 0x5}, 0x0, 0x81, 0x7, './file0'}, {{0x8, 0x3, 0x3}, 0x10000, 0x0, 0x7, './file1'}]}}, 0x49) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r5, 0x7001) ioctl$RTC_AIE_OFF(r5, 0x7002) [ 2931.831421][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2931.837271][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2931.843144][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2931.848912][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2931.854809][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2931.860602][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2931.993098][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2931.998934][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2932.004857][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2932.010624][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:05:27 executing program 3: r0 = socket(0x1e, 0x805, 0x0) sendmsg$tipc(r0, &(0x7f00000003c0)={&(0x7f00000000c0)=@name={0x1e, 0x2, 0x0, {{0x1, 0x4}}}, 0x10, 0x0}, 0x0) 03:05:27 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca01000000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x9e945000, 0x3e0000}], 0x0) 03:05:27 executing program 0: r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000080)='.\x00', 0xfe) r1 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYRES64, @ANYRESHEX=r0], 0x71) listxattr(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f00000001c0), 0xa198) 03:05:27 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f000018effc)=0x1c, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$unix(r1, 0x0, 0x0, 0x0) 03:05:28 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca01000000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x9e945000, 0x3e0000}], 0x0) 03:05:28 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000000)="240000002100255107000165ff00fc020200000900100f000ee1000c0800060000000000", 0x24) 03:05:28 executing program 2: r0 = syz_open_dev$adsp(0x0, 0x5, 0x10040) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f0000000240)={{&(0x7f0000ff9000/0x4000)=nil, 0x4000}, 0x1}) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)=0x0) fcntl$lock(r1, 0x6, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x6, r3}) openat$tun(0xffffffffffffff9c, &(0x7f0000000380)='/dev/net/tun\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$RXRPC_SECURITY_KEYRING(r4, 0x110, 0x2, &(0x7f0000000100)='xfs\x00', 0x4) syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x1000000000040000, 0x4) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) quotactl(0x0, 0x0, 0x0, 0x0) r5 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r6 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x7f, 0x102) write$P9_RREADDIR(r6, &(0x7f0000000280)={0x49, 0x29, 0x1, {0x3, [{{0x0, 0x2, 0x5}, 0x0, 0x81, 0x7, './file0'}, {{0x8, 0x3, 0x3}, 0x10000, 0x0, 0x7, './file1'}]}}, 0x49) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x9) ioctl$RTC_AIE_ON(r5, 0x7001) ioctl$RTC_AIE_OFF(r5, 0x7002) 03:05:28 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a602c0fffa8430291000000390004002b000c000b0000001900050000000000000008dc1338d54402009bcdc66ef75afb83de448daa7227c43ab8220000060cec4fab91cf", 0x55}], 0x1}, 0x0) 03:05:28 executing program 5: perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) kexec_load(0x5050ca01000000, 0x10, &(0x7f0000000180)=[{&(0x7f00000001c0), 0x2, 0x9e945000, 0x3e0000}], 0x0) [ 2933.710776][ T26] kauditd_printk_skb: 198 callbacks suppressed [ 2933.710791][ T26] audit: type=1400 audit(1552187128.717:23646): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:28 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x84, 0x800000ec2, 0x4000000000002, 0x2}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000000080)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x29) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 2933.876519][ T26] audit: type=1400 audit(1552187128.796:23647): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:28 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f000018effc)=0x1c, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$unix(r1, 0x0, 0x0, 0x0) [ 2934.027772][ T26] audit: type=1400 audit(1552187128.816:23648): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2934.144224][ T26] audit: type=1400 audit(1552187128.826:23649): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2934.315721][ T26] audit: type=1400 audit(1552187128.836:23650): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2934.494919][ T26] audit: type=1400 audit(1552187128.846:23651): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2934.672126][ T26] audit: type=1400 audit(1552187128.876:23652): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2934.820919][ T26] audit: type=1400 audit(1552187128.945:23653): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:29 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4000004e23, @multicast1}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='dctcp\x00', 0x6) sendto$inet(r0, 0x0, 0x2ec, 0x200007fd, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='illinois\x00\xa0\x93\xff\xff\x00\x00\x85\x97\xab\x8cO\xd1\x81\\\r\x9eX\xfa\x9f\xa39\x01\xb5\xc5@\xef\x9aG\xcc\xc8m', 0x100000423) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='vxcan1\x00\x00\x00\xf8\xff\xff\xff\x00', 0x10) sendto(r0, &(0x7f0000000080)='\x00', 0x1, 0x0, 0x0, 0x0) 03:05:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)={0x2, 0x16, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000e05000)={0x2, 0xd, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 2935.026668][ T26] audit: type=1400 audit(1552187128.945:23654): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2935.192622][T25058] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 03:05:30 executing program 1: syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000400)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x40000000011, 0x0, 0x0) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) [ 2935.224753][ T26] audit: type=1400 audit(1552187128.975:23655): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:30 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f000018effc)=0x1c, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$unix(r1, 0x0, 0x0, 0x0) 03:05:30 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000240)=[@acquire={0x40046302}], 0x0, 0x0, 0x0}) 03:05:30 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a602c0fffa8430291000000390004002b000c000b0000001900050000000000000008dc1338d54402009bcdc66ef75afb83de448daa7227c43ab8220000060cec4fab91cf", 0x55}], 0x1}, 0x0) 03:05:30 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000000), 0xfffffdef, 0xc0, 0x0, 0x14280000000000) [ 2936.105361][T25109] binder: BC_ACQUIRE_RESULT not supported [ 2936.130377][T25109] binder: 25088:25109 ioctl c0306201 20000200 returned -22 03:05:31 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000240)=[@acquire={0x40046302}], 0x0, 0x0, 0x0}) 03:05:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000200)={0x10003}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1f3, 0xfffffffffffffffc, 0x0, 0x127) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 2937.016953][T25337] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 03:05:32 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f000018effc)=0x1c, 0x4) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept4$unix(r1, 0x0, 0x0, 0x0) [ 2937.126968][T25391] binder: BC_ACQUIRE_RESULT not supported [ 2937.173137][T25391] binder: 25325:25391 ioctl c0306201 20000200 returned -22 03:05:32 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000240)=[@acquire={0x40046302}], 0x0, 0x0, 0x0}) 03:05:32 executing program 5: r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfdfb, 0x102005, 0x0, 0xfffffe59) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x400000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000700), &(0x7f0000000280)=0x4) r2 = shmget(0x2, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000009c0)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f0000000380)=0xe8) lstat(&(0x7f0000000000)='./file0/file0\x00', &(0x7f00000007c0)) gettid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f00000002c0)=0xc) r7 = getpgid(r6) connect$bt_l2cap(r0, &(0x7f0000000340)={0x1f, 0x1, {0xccce, 0x7, 0x80000001, 0x8, 0x8, 0x5}, 0x200, 0x6}, 0xe) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000840)={{0x0, r3, r4, r5, r4, 0x4c1078b5631b409f, 0xb}, 0xb8fb, 0xffc, 0x3, 0x8000, r7, r7, 0x81}) r8 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x4, 0x2000) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000000) sendmsg(r0, &(0x7f0000001b40)={&(0x7f00000003c0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x3, 0x2, 0x4, {0xa, 0x4e24, 0xfffffffffffffff7, @loopback, 0x4}}}, 0x33a, &(0x7f0000001a00), 0x244}, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000001c0)="2d41d358b8261e7d73e3e48511a08593", 0x10) ioctl$BLKTRACESETUP(r8, 0xc0481273, &(0x7f0000000080)={[0x0, 0x0, 0x15030000], 0x2, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000680)='dctcp\x00', 0x6) perf_event_open(&(0x7f0000000080)={0x3, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x8, 0x2000, 0xe, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x8001, 0x4, 0x9e6d, 0x73d9, 0x5c97, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x0, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x6, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x5, 0x6, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) request_key(&(0x7f00000005c0)='pkcs7_test\x00', &(0x7f0000000540)={'syz', 0x1}, &(0x7f0000000740)='Fvmnet1/\x00', 0xffffffffffffffff) add_key(&(0x7f00000008c0)='dns_resolver\x00', &(0x7f0000000900)={'syz', 0x3}, &(0x7f0000000ac0)="93306bd5e5cd077834a342a7221f114272fc2e5ce2e334da1e8d91165abd90a11ef0a24c92a824aef7e56a8dc4aa9a58812d948b554dcf9975614855d2513886658ca05135e6db381b6f90de095fc4405b52cbc1b150999bb530a347", 0x5c, 0xfffffffffffffff9) r9 = request_key(&(0x7f0000000980)='keyring\x00', &(0x7f0000000b80)={'syz', 0x0}, &(0x7f0000000040)='vboxnet1em1vboxnet1\'\'\x00', 0xfffffffffffffffb) r10 = add_key$keyring(&(0x7f0000000940)='keyring\x00', &(0x7f0000000c00)={'syz', 0x0}, 0x0, 0x0, r9) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440)=[{0x0}], 0x1, r10) io_setup(0xa7e7, &(0x7f0000000580)) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f0000000c40)={'broute\x00', 0x0, 0x0, 0x0, [], 0x2, &(0x7f0000000100)=[{}, {}, {}], 0x0, [{}, {}]}, 0x98) syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') 03:05:32 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a602c0fffa8430291000000390004002b000c000b0000001900050000000000000008dc1338d54402009bcdc66ef75afb83de448daa7227c43ab8220000060cec4fab91cf", 0x55}], 0x1}, 0x0) 03:05:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='cmdline\x00\xb1R@L\x9a\xe1\xbf\xe5m\vP') ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000440)) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000680)=0xffffffffffffff81, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x5) get_mempolicy(&(0x7f0000000000), &(0x7f00000001c0), 0x1ff, &(0x7f0000ffe000/0x1000)=nil, 0x3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x3f000000) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r1, 0x118, 0x1, &(0x7f0000000240)=0x80000000, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r2, 0x50, &(0x7f0000000380)}, 0x10) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000400)=0x30) write$FUSE_POLL(r0, &(0x7f0000000300)={0x18, 0x0, 0x2, {0x7}}, 0x18) r4 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="ddc5788974d717f1b8d6b5736e160de6992ad3cda082c380fc995bb076f6879cbc8fe13cbefa381be64daaeee2facca55497e2a52c2e1436f41375c25f71cbca4f406ae63a98f3f107421296013fe6b65a84f86d3dac3b1436c86d562f02ba8ec86e4513dd5fde68b9e6a063977f55223829d6f9305a", 0x76, r4) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080), &(0x7f00000000c0), 0x0, 0xfffffffffffffffe) syz_open_dev$mice(&(0x7f00000007c0)='/dev/input/mice\x00', 0x0, 0x200000) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f0000000140)={0x2, 0x1, 0x5, 0x1000, &(0x7f0000ffc000/0x1000)=nil}) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, &(0x7f0000000200)=0x781, 0x81, 0x3) [ 2938.010393][T25604] binder: BC_ACQUIRE_RESULT not supported [ 2938.016160][T25604] binder: 25566:25604 ioctl c0306201 20000200 returned -22 [ 2938.122036][ C0] net_ratelimit: 26 callbacks suppressed [ 2938.122044][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2938.133481][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2938.139275][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2938.145078][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2938.150939][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2938.156714][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2938.281728][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2938.287564][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2938.293503][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2938.299281][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2938.489909][T25691] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 03:05:33 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:05:33 executing program 4: mq_open(&(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x1, 0x0) capset(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005500)='/dev/ptmx\x00', 0x0, 0x0) msgget(0x0, 0x11) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000003c0)=0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_IRQCHIP(0xffffffffffffffff, 0xae60) add_key(&(0x7f0000000100)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000000400), 0x4) syz_genetlink_get_family_id$ipvs(0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000240)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r0, 0x0, 0x0) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000300), 0xc, 0x0, 0x1, 0x0, 0x0, 0x40000}, 0x0) pipe(0x0) close(r1) socket$can_raw(0x1d, 0x3, 0x1) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, 0x0, &(0x7f00000004c0)) 03:05:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, 0x0, 0x0) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) poll(&(0x7f0000000000), 0x18, 0x0) 03:05:33 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000200)={0x8, 0x0, &(0x7f0000000240)=[@acquire={0x40046302}], 0x0, 0x0, 0x0}) 03:05:33 executing program 3: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)="5500000018007f5300fe01b2a4a280930a602c0fffa8430291000000390004002b000c000b0000001900050000000000000008dc1338d54402009bcdc66ef75afb83de448daa7227c43ab8220000060cec4fab91cf", 0x55}], 0x1}, 0x0) 03:05:33 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x80044dff, &(0x7f0000000080)) [ 2939.080689][T25834] binder: BC_ACQUIRE_RESULT not supported [ 2939.090840][T25834] binder: 25812:25834 ioctl c0306201 20000200 returned -22 03:05:34 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200000000100f000ee1000c08000a000001a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000080)) 03:05:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xd, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x5, 0x1, 0x48}]}, &(0x7f0000000100)='GPL\x00'}, 0x48) [ 2939.359906][ T26] kauditd_printk_skb: 234 callbacks suppressed [ 2939.359935][ T26] audit: type=1400 audit(1552187134.313:23890): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:34 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fremovexattr(r0, &(0x7f0000000a40)=@known='user.syz\x00') [ 2939.475973][T26017] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 2939.494097][ T26] audit: type=1400 audit(1552187134.333:23891): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2939.611149][ T26] audit: type=1400 audit(1552187134.353:23892): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2939.767444][ T26] audit: type=1400 audit(1552187134.372:23893): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:34 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002840)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd4, 0x0, 0x4) 03:05:34 executing program 1: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000300)) 03:05:34 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x6fff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x1) [ 2939.925747][ T26] audit: type=1400 audit(1552187134.372:23894): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2940.082103][ T26] audit: type=1400 audit(1552187134.392:23895): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2940.220384][ T26] audit: type=1400 audit(1552187134.412:23896): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:35 executing program 4: lookup_dcookie(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0xf7c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, 0x0, 0x0) mkdirat$cgroup(r0, 0x0, 0x1ff) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f0000000040)=[{&(0x7f0000000100)="eb3c906d6b66732e666174000204010002000270f7f8", 0x16}], 0x700, 0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) r1 = syz_open_dev$vcsn(0x0, 0x0, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) setsockopt$bt_BT_SECURITY(0xffffffffffffffff, 0x112, 0x4, 0x0, 0x0) semget$private(0x0, 0x0, 0x100) setsockopt$inet_tcp_int(r1, 0x6, 0x19, 0x0, 0x0) [ 2940.339293][ T26] audit: type=1400 audit(1552187134.472:23897): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2940.502720][ T26] audit: type=1400 audit(1552187134.491:23898): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2940.598634][T26232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=26232 comm=syz-executor.2 [ 2940.647511][ T26] audit: type=1400 audit(1552187134.511:23899): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:35 executing program 5: r0 = socket$kcm(0xa, 0x2, 0x73) bind(r0, &(0x7f0000000200)=@in6={0xa, 0x0, 0x0, @local}, 0x80) 03:05:35 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200000000100f000ee1000c08000a000001a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000080)) 03:05:35 executing program 1: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200000000100f000ee1000c08000a000001a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000080)) 03:05:35 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGSKNS(r0, 0x894c, 0x0) write(r0, &(0x7f0000000000)="2400000058001f001007f4f9002304000a04f51108000100020100020800038005000000", 0x24) 03:05:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)=@updsa={0x138, 0x1a, 0x509, 0x0, 0x0, {{@in=@multicast2, @in6=@remote}, {@in6=@mcast1, 0x0, 0x3c}, @in6=@mcast2, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x48, 0x2, {{'ctr(camellia)\x00'}}}]}, 0x138}}, 0x0) 03:05:36 executing program 5: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, &(0x7f0000000040)=0xf) ioctl$TCSETAF(r3, 0x5408, &(0x7f00000006c0)={0x59, 0x7fff, 0x9f2a, 0x9, 0x4, 0x2, 0x3ff, 0x3, 0xfffffffffffffff8, 0x2}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r3, 0x8008ae9d, &(0x7f0000000780)=""/238) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x6d, 0x20000000000014, 0x0, 0x0}, 0x1db) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB="000800007bb2000c00670a198a1374"], 0x1}, 0x1, 0x0, 0x0, 0x10}, 0x8000) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f00000003c0)={0x84, @broadcast, 0x8800, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 ', 0x20000000000, 0x0, 0x800}, 0x2c) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) mount$overlay(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='overlay\x00', 0x2026002, &(0x7f0000000540)=ANY=[@ANYBLOB="78692e6b93bd4268f8746e6f3d6f66662c636f6e746578743d73746166665f752c66736e616d653d6e65742f27a13917cabab01c9fb18074637036002c6d61736b3d4d"]) ioctl$KVM_REGISTER_COALESCED_MMIO(r5, 0x4010ae67, &(0x7f0000000680)={0x2006, 0x4000}) ioctl$TCSETAW(r3, 0x5407, &(0x7f0000000700)={0x80000001, 0x9, 0xde5b, 0xa588, 0x401, 0x3, 0x6, 0x10000, 0x8, 0x5e6}) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000640)) r7 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}, &(0x7f0000000380)=0x10) poll(&(0x7f0000000440)=[{r1}, {r7, 0x4208}, {r0, 0x401}, {r3, 0x80}, {r6, 0x109}], 0x5, 0x3ff) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000000c0)={0x7, 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0763044002400f"], 0x0, 0x0, 0x0}) mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x80000800c1018, r3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)) syz_open_dev$midi(0x0, 0x0, 0x101000) setxattr$security_selinux(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000000400)='tystem_u:object_r:device_t:s0\x00', 0x1e, 0x0) 03:05:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x4) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write$binfmt_misc(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="ba"], 0x1) write(r1, &(0x7f0000000100), 0x1ede5) accept(r0, 0x0, 0x0) [ 2941.806221][T26660] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=26660 comm=syz-executor.2 03:05:36 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000400)=""/19) r1 = socket$inet(0x2, 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) r2 = dup2(r1, r0) ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, 0x0) ioctl$ASHMEM_GET_SIZE(r2, 0x7704, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) 03:05:37 executing program 1: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200000000100f000ee1000c08000a000001a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000080)) 03:05:37 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200000000100f000ee1000c08000a000001a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000080)) 03:05:37 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000011ff0)={0x2, 0x4e20, @multicast2}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00000000c0)=0x8000000004, 0x4) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000356ffc)=0xffffffffffffff40, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e20}, 0x10) listen(r0, 0x0) 03:05:37 executing program 4: r0 = socket$inet6(0xa, 0x3000000000005, 0xfffffffffffffffc) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/checkreqprot\x00', 0x100, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x5000000, 0x0, 0x3, 0x3}, 0x20) r3 = add_key$keyring(&(0x7f0000001840)='keyring\x00', &(0x7f0000001880)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r3, 0x1) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rfkill\x00', 0x0, 0x0) r5 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x0, 0x80300) r6 = semget(0x3, 0x7, 0x200) semtimedop(r6, &(0x7f00000001c0)=[{0x0, 0x0, 0x1000}], 0x1, &(0x7f0000000240)={0x0, 0x1c9c380}) semctl$GETVAL(r6, 0x3, 0xc, &(0x7f0000000680)=""/4096) r7 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fee000/0x11000)=nil, 0x11000, 0x1000002, r7) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000140)=0x8) semctl$GETVAL(r6, 0x7, 0xc, &(0x7f0000001680)=""/161) ioctl$VT_SETMODE(r5, 0x5602, &(0x7f0000001740)={0x221, 0x8, 0x100000000, 0x4, 0x3}) r8 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x191400) ioctl$GIO_FONTX(r8, 0x4b6b, &(0x7f0000001780)=""/159) ioctl$KDADDIO(r5, 0x4b34, 0x3) creat(&(0x7f0000000440)='./bus\x00', 0x4) ioctl$NBD_SET_SIZE_BLOCKS(r0, 0xab07, 0x10001) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r9 = creat(&(0x7f0000000480)='./bus\x00', 0x1000000000) set_thread_area(&(0x7f0000000340)={0x6, 0xffffffffffffffff, 0x400, 0x7, 0x1400000000000, 0x5, 0x6, 0x5, 0x0, 0x6}) ftruncate(r9, 0x7cf) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f0000000300)={0x0}) semctl$SETALL(r6, 0x0, 0x11, &(0x7f0000000400)=[0x3f26, 0x9, 0x6, 0x8, 0xff]) ioctl$DRM_IOCTL_GET_CTX(r4, 0xc0086423, &(0x7f0000000380)={r10, 0x1}) syz_init_net_socket$llc(0x1a, 0x3, 0x0) 03:05:37 executing program 5: memfd_create(&(0x7f00000000c0)='+\x8b\x8a\x16\x11\xda\x04\x9c\xf9AoJ\x02u\x9b\x94a\xac\x00\x00\x00\x00\x00\x00NX\xc4\x96\x06M\vU\xdd\x93\xcf\xd0\xccd\x18\xf8k\xda\x89T\x06fg\xdb\xacv\xe3f8\x99\xf1\xf3>=\xc0\xa6?\xc1\\<\xdfk\x8e\xedFWZD\xa4\xa42Z\xa1\xbd\xe2\x84pq\xdc>\x92\x9f\x00n\x7f\xde\xa2\xf5\x98\xa8\x83Y\xf3\x02\x8c\vx\x12%\x88\x0e\xbe)V\xe8\x01{\xect\x1d\xb4\xf6\xab\xac\x01\xeb\x0f)\x89O\xdb\xf0\xb2x\x9fT\xcdFL\xcb\x8f\x8e\x9b\x17\xf6y\xca\xb4a\x1d\x1ce\xb7Jg\x87-\x00\xea$\x1d,cR\xd4', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)='.\x00\x00\x00>\x00', 0x6}], 0x1}, 0x0) r2 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="006386dd55"], 0x5) 03:05:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_XSAVE(r2, 0x9000aea4, &(0x7f0000000480)) 03:05:38 executing program 1: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200000000100f000ee1000c08000a000001a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000080)) 03:05:38 executing program 2: r0 = socket(0x848000000015, 0x805, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000001000)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r2 = accept$alg(r1, 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f00000005c0)="0a5cc80700315f85714070") r4 = socket(0x400000000010, 0x3, 0x0) write(r4, &(0x7f00000004c0)="2400000021002551071c0165ff0ffc020200000000100f000ee1000c08000a000001a000bc0000008f3943793a5ea67658cb22b79489bbdd14f6fd59b97dc8f8b550e66a2bff77c4931da84157f7a733686a22fd8169f6b6b4f464e0c05df670d851f785ea2b85d32b3583d87124da3bb0b9e2cc000000dcce1fb4ac2cbd48c8378a3ad82a5b83c01295723da595c483daabb7e919e204853d48a5a6bd525801d5cae983cf4544a9c4c396f36e85787a8efc32e0015c85ead2b748bc6a5fefc4e53543f9f65e3da31a110af1acb78ce510c7e060f433314f5a171b182deb7904", 0xe0) sendmsg$alg(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f000077ff7d), 0xfffffef4}], 0x1, &(0x7f0000000080)}, 0x0) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) ioctl$RTC_EPOCH_READ(r5, 0x8008700d, &(0x7f0000000080)) 03:05:39 executing program 5: mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB=',fscontext=']) clone(0x1002102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000040)='sysfs\x00', 0x0, &(0x7f0000000480)) 03:05:39 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f3188b070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00000000c0)='syzkaller\x00'}, 0x48) r3 = socket$kcm(0x29, 0x2000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000140)={r1, r2}) write$binfmt_elf32(r3, &(0x7f0000000280)=ANY=[@ANYRESHEX], 0x12) setsockopt$kcm_KCM_RECV_DISABLE(r3, 0x119, 0x1, &(0x7f0000001400)=0x5b60, 0x4) 03:05:39 executing program 0: creat(0x0, 0x140) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0), 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$tun(r0, &(0x7f0000000500)=ANY=[@ANYRESDEC], 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x3e6, 0x0, 0x0, 0x0, 0x4fe0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) [ 2944.409526][ C0] net_ratelimit: 26 callbacks suppressed [ 2944.409535][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2944.411855][ T26] kauditd_printk_skb: 229 callbacks suppressed [ 2944.411870][ T26] audit: type=1400 audit(1552187139.333:24129): avc: denied { map } for pid=27679 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2944.415242][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2944.442370][ T26] audit: type=1400 audit(1552187139.363:24130): avc: denied { map } for pid=27679 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2944.452540][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2944.491831][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2944.497640][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2944.503477][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2944.570795][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2944.576586][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2944.582447][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2944.588212][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2944.597343][ T26] audit: type=1400 audit(1552187139.413:24131): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:39 executing program 3: r0 = socket$inet6(0xa, 0x2000000802, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f68000)={@loopback, 0x0, 0x0, 0xff, 0x1, 0x3f}, 0x20) [ 2944.772343][ T26] audit: type=1400 audit(1552187139.413:24132): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2944.778303][T27784] SELinux: security_context_str_to_sid() failed for (dev sysfs, type sysfs) errno=-22 [ 2944.926836][ T26] audit: type=1400 audit(1552187139.433:24133): avc: denied { map } for pid=27679 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x400000003a) setsockopt$inet6_int(r0, 0x29, 0xce, 0x0, 0x0) [ 2945.060331][ T26] audit: type=1400 audit(1552187139.443:24134): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:40 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_DIRTY_LOG(r1, 0xc018aec0, &(0x7f0000000080)={0x1ff, 0x0, &(0x7f0000ffe000/0x1000)=nil}) [ 2945.198630][ T26] audit: type=1400 audit(1552187139.452:24135): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2945.306872][ T26] audit: type=1400 audit(1552187139.452:24136): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2945.476071][ T26] audit: type=1400 audit(1552187139.552:24137): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:40 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='mountinfo\x00') preadv(r0, &(0x7f0000000480), 0x1000000000000241, 0x0) 03:05:40 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000001000002, 0x1013, r0, 0x4000) [ 2945.591705][ T26] audit: type=1400 audit(1552187139.552:24138): avc: denied { map } for pid=27679 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:40 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x0, 0x0, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)) r1 = gettid() ptrace$setopts(0x4206, r1, 0x200000006, 0x100009) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000200), 0x0, 0x2}, 0x20) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000800)=ANY=[], 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180), &(0x7f0000000280)=0xc) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) mlockall(0x41000002) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = creat(&(0x7f00000001c0)='./file0\x00', 0x82) prlimit64(r3, 0xf, 0x0, &(0x7f0000000240)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) flock(r2, 0x2) ioctl$DRM_IOCTL_MARK_BUFS(r4, 0x40206417, &(0x7f0000000040)={0x80, 0x5, 0x7, 0x400, 0xd}) write$binfmt_elf64(r5, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r5, 0x0, 0x7fff, 0x4003ff) r6 = request_key(&(0x7f0000000a00)='syzkaller\x00', &(0x7f0000000a40)={'syz', 0x0}, &(0x7f0000000a80)='#systemcgroup\\%\\user\'\\nodevmd5sum\x00', 0xfffffffffffffffb) keyctl$get_persistent(0x16, 0x0, r6) ioctl$PPPIOCSNPMODE(r5, 0x4008744b, &(0x7f0000000140)={0xc025, 0x3}) write$cgroup_type(r5, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r5, 0x3, 0x5e89, 0xfff9) write$P9_RREADLINK(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) 03:05:40 executing program 1: r0 = socket$inet(0x10, 0x800000003, 0xc) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="24000000020707041dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:05:41 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000080)='./control\x00', 0x0) creat(&(0x7f0000000040)='./control/file0\x00', 0x0) r0 = open(&(0x7f0000000380)='./control\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000400)='./file0\x00', 0x0) rmdir(&(0x7f0000000140)='./control\x00') 03:05:41 executing program 1: r0 = syz_open_dev$video(&(0x7f00000000c0)='/dev/video#\x00', 0x6287, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000180)={0x3, @pix={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70a000, 0x0, 0x1}}) 03:05:41 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000026000)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001000)={{0x100000001}}) r1 = syz_open_dev$sndtimer(0x0, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f000000efcc)={{0x100000001}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r1, 0x54a2) close(r1) 03:05:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000001800)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01ab", 0x18) r1 = accept$alg(0xffffffffffffffff, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}], 0x1, 0x0) socket$inet6(0xa, 0x3, 0x8010000000000084) bind$inet6(0xffffffffffffffff, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000380)={0xffff, 0x0, 0x0, 0x1, 0x0, 0x5c, 0x392f, 0x0, 0x0, 0xfffffffffffffffd}) semget$private(0x0, 0x3, 0x84) semctl$GETPID(0x0, 0x5, 0xb, 0x0) r2 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000200), 0x4) getgroups(0x2, &(0x7f0000000680)=[0x0, 0x0]) mkdir(&(0x7f0000000100)='./file0\x00', 0x4) mount(&(0x7f0000000300)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='rpc_pipefs\x00', 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) io_setup(0x9, &(0x7f0000000400)=0x0) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000005c0)=0x40) ioctl$VHOST_SET_LOG_FD(0xffffffffffffffff, 0x4004af07, 0x0) write$binfmt_script(r2, 0x0, 0x0) io_submit(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r3, 0x0, 0x3) 03:05:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x6b9f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:05:42 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000080)='./control\x00', 0x0) creat(&(0x7f0000000040)='./control/file0\x00', 0x0) r0 = open(&(0x7f0000000380)='./control\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000400)='./file0\x00', 0x0) rmdir(&(0x7f0000000140)='./control\x00') 03:05:42 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup\x00', 0x200002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000)='cgroup.subtree_control\x00', 0x2, 0x0) close(r1) openat$cgroup_int(r0, &(0x7f0000000100)='rdma.max\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001880)=[{{0x0, 0x0, 0x0}, 0x4}], 0x1, 0x0, 0x0) readv(r1, &(0x7f00000002c0), 0x1a5) 03:05:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x20, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x20000000005}, [@nested={0xc, 0x111, [@typed={0x8, 0x2, @pid}]}]}, 0x20}}, 0x0) 03:05:42 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xa) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 03:05:43 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000001000002, 0x1013, r0, 0x4000) 03:05:43 executing program 5: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) pipe(0x0) ioperm(0x8, 0x9d8d, 0x1b6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000002c0)={0x0, 0x4, 0x1140f3d0}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f0000000100)=0x8) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x10000, 0x2, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000765ffff040000000600395032303030"], 0x13) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in6}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000700)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000480)='bpf\x00', 0x2001, &(0x7f0000000740)=ANY=[@ANYBLOB="fc8d9d4608ef3a5516ff30b2225b947eeca4b8800000a9269f2e123cfc1c5d32fe465e21244b9256bc2657a254ca4993d7b201227ae33dbc3d3b672835c90ad97ad06a39c0ab41841f64bbd4145e9caaee3fc75cc8e335ec859a2b2817e26ed515"]) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000007c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000340)={0x6, 0x9}) socket$inet6(0xa, 0x6, 0xfffffffffffffc00) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) 03:05:43 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000080)='./control\x00', 0x0) creat(&(0x7f0000000040)='./control/file0\x00', 0x0) r0 = open(&(0x7f0000000380)='./control\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000400)='./file0\x00', 0x0) rmdir(&(0x7f0000000140)='./control\x00') 03:05:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) ioctl$FS_IOC_GETFSLABEL(r1, 0x400452c9, &(0x7f0000000100)) 03:05:43 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f000014f000)={&(0x7f00003c7ff4), 0xc, &(0x7f0000bd7000)={&(0x7f0000648eac)=@newsa={0xf0, 0x10, 0x717, 0x0, 0x0, {{@in6=@mcast2, @in6=@ipv4={[], [], @local={0xac, 0x14, 0xffffffffffffffff}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}, {@in6}, @in, {}, {}, {}, 0x0, 0x0, 0xa}}, 0xf0}}, 0x0) 03:05:43 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xa) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 03:05:44 executing program 1: setrlimit(0x8, &(0x7f0000000040)) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000900)='/dev/cachefiles\x00', 0x8000, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000940)={'ipvs\x00'}, &(0x7f0000000980)=0x1e) r1 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f00000007c0)={0x7, 0x5, 0xdc8, 0x80000001, 0x0}, &(0x7f0000000800)=0x10) getsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000000840)={r3, 0x3, 0x2}, &(0x7f0000000880)=0x10) setreuid(0x0, r2) umount2(&(0x7f0000000780)='./file0\x00', 0x0) recvmsg(r1, &(0x7f0000000740)={&(0x7f0000000080)=@xdp, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000240)=""/253, 0xfd}, {&(0x7f0000000100)=""/173, 0xad}, {&(0x7f0000000340)=""/72, 0x48}, {&(0x7f00000003c0)=""/254, 0xfe}, {&(0x7f00000004c0)=""/234, 0xea}, {&(0x7f00000005c0)=""/232, 0xe8}], 0x6, &(0x7f0000000000)=""/4, 0x4}, 0x0) shmget$private(0x0, 0x12000, 0x78000000, &(0x7f0000fed000/0x12000)=nil) shmget$private(0x0, 0x1000, 0x82, &(0x7f0000ff0000/0x1000)=nil) shmget(0x0, 0x1000, 0x78000008, &(0x7f0000ffc000/0x1000)=nil) shmctl$SHM_LOCK(0x0, 0xb) 03:05:44 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000001000002, 0x1013, r0, 0x4000) 03:05:44 executing program 2: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000080)='./control\x00', 0x0) creat(&(0x7f0000000040)='./control/file0\x00', 0x0) r0 = open(&(0x7f0000000380)='./control\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000400)='./file0\x00', 0x0) rmdir(&(0x7f0000000140)='./control\x00') [ 2949.465691][ T26] kauditd_printk_skb: 236 callbacks suppressed [ 2949.465706][ T26] audit: type=1400 audit(1552187144.344:24375): avc: denied { map } for pid=29041 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2949.615838][ T26] audit: type=1400 audit(1552187144.344:24376): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:44 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xa) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) [ 2949.834376][ T26] audit: type=1400 audit(1552187144.354:24377): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:44 executing program 5: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) pipe(0x0) ioperm(0x8, 0x9d8d, 0x1b6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000002c0)={0x0, 0x4, 0x1140f3d0}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f0000000100)=0x8) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x10000, 0x2, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000765ffff040000000600395032303030"], 0x13) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in6}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000700)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000480)='bpf\x00', 0x2001, &(0x7f0000000740)=ANY=[@ANYBLOB="fc8d9d4608ef3a5516ff30b2225b947eeca4b8800000a9269f2e123cfc1c5d32fe465e21244b9256bc2657a254ca4993d7b201227ae33dbc3d3b672835c90ad97ad06a39c0ab41841f64bbd4145e9caaee3fc75cc8e335ec859a2b2817e26ed515"]) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000007c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000340)={0x6, 0x9}) socket$inet6(0xa, 0x6, 0xfffffffffffffc00) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) [ 2950.032756][ T26] audit: type=1400 audit(1552187144.384:24378): avc: denied { map } for pid=29041 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2950.182478][ T26] audit: type=1400 audit(1552187144.404:24379): avc: denied { map } for pid=29062 comm="syz-executor.0" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=179035 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:hugetlbfs_t:s0 tclass=file permissive=1 [ 2950.327410][ T26] audit: type=1400 audit(1552187144.423:24380): avc: denied { map } for pid=29041 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2950.446824][ T26] audit: type=1400 audit(1552187144.443:24381): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:45 executing program 0: mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x5c831, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0xa) madvise(&(0x7f0000779000/0x600000)=nil, 0x600000, 0x1000000000009) 03:05:45 executing program 3: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) pipe(0x0) ioperm(0x8, 0x9d8d, 0x1b6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000002c0)={0x0, 0x4, 0x1140f3d0}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f0000000100)=0x8) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x10000, 0x2, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000765ffff040000000600395032303030"], 0x13) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in6}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000700)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000480)='bpf\x00', 0x2001, &(0x7f0000000740)=ANY=[@ANYBLOB="fc8d9d4608ef3a5516ff30b2225b947eeca4b8800000a9269f2e123cfc1c5d32fe465e21244b9256bc2657a254ca4993d7b201227ae33dbc3d3b672835c90ad97ad06a39c0ab41841f64bbd4145e9caaee3fc75cc8e335ec859a2b2817e26ed515"]) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000007c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000340)={0x6, 0x9}) socket$inet6(0xa, 0x6, 0xfffffffffffffc00) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) [ 2950.549780][ T26] audit: type=1400 audit(1552187144.443:24382): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2950.656926][ T26] audit: type=1400 audit(1552187144.463:24383): avc: denied { map } for pid=29041 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2950.699223][ C0] net_ratelimit: 26 callbacks suppressed [ 2950.699243][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.710685][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:05:45 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x34003}, 0xc, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="1cff00000000000000001f02ee478b77f170021960b9965a9c5b6e7b17e19de208d4f85e2ffa86f3530be78a70266d22a553de961023d3a4e3292cead9ec619881909e7186925bf7d3459e79a177d0c06a73302df437bf24d480db170cb6949ccfdb015d738b809135d3632a3f4b362bdcf4b4226221f9914dd83aa54ab5afc984960f9c482f6d65ff5073ac291e77a144313612f21454ff2421c062954863902a2d5a792e3a26ad1e3d398c1da7494f4e4df93e9c", @ANYRES32=0x0], 0x2}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0xa}, 0x1c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x5100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) close(r2) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000001f3a)="ad56b6c5820faeb995298992ea54c7beef9f5d56534c90c2", 0x18) r4 = accept$alg(r2, 0x0, 0x0) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r5, 0x1, &(0x7f0000bd9fe0)=[&(0x7f0000617fc0)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f000007d000)="b3", 0x1}]) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r6, 0x0, 0x482, &(0x7f0000000080)={0x100000011, @multicast2, 0x0, 0x0, 'lblc\x00'}, 0x2c) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000000)={0x11, @dev, 0x0, 0x0, 'lblcr\x00'}, 0x2c) r8 = socket$l2tp(0x18, 0x1, 0x1) bind$nfc_llcp(r7, &(0x7f0000000380)={0x27, 0x1, 0x1, 0x3, 0xf7aa, 0x1, "0de1a68a6dde6fd442a6a6566c4033904557c577aba9421e119997bdcbc56137500698b4b9948580dceb5a2035d4ce0a0f494083cd91e664e33fb1aca74893", 0xb}, 0x60) connect$l2tp(r8, &(0x7f00005fafd2)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) fsetxattr(r1, &(0x7f0000000240)=@random={'btrfs.', 'selinux\'user\x00'}, &(0x7f0000000280)='lblcr\x00', 0x6, 0x1) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000140)={r9, @in6={{0xa, 0x4e21, 0x81, @empty, 0x8000}}}, &(0x7f0000000200)=0x84) r10 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x0, 0x0) r11 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300)='/dev/autofs\x00', 0x100, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r10, 0x8004e500, &(0x7f0000000340)=r11) sendmmsg(r8, &(0x7f0000005fc0)=[{{&(0x7f0000005680)=@sco, 0x80, &(0x7f0000005b00)}}, {{&(0x7f0000005b80)=@l2, 0x80, &(0x7f0000005c40), 0x2ed, &(0x7f0000005c80), 0x3a00}}], 0x3e8, 0x0) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x2000, 0x0) getresuid(&(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000200)) [ 2950.779243][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.785032][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2950.790910][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.796680][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:05:45 executing program 4: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYRES16], 0x2) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000001000002, 0x1013, r0, 0x4000) [ 2950.846793][ T26] audit: type=1400 audit(1552187144.473:24384): avc: denied { map } for pid=29041 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2950.859828][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.877649][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2950.883602][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2950.889404][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:05:45 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x8000000000001e, 0x5, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000785000), 0x34a) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) sendmmsg$alg(r2, &(0x7f0000236fc8), 0x6e, 0x0) 03:05:46 executing program 0: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x4000000000072, 0xffffffffffffffff, 0x0) ioctl(r0, 0xc0884123, &(0x7f0000001f64)) 03:05:46 executing program 5: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) pipe(0x0) ioperm(0x8, 0x9d8d, 0x1b6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000002c0)={0x0, 0x4, 0x1140f3d0}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f0000000100)=0x8) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x10000, 0x2, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000765ffff040000000600395032303030"], 0x13) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in6}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000700)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000480)='bpf\x00', 0x2001, &(0x7f0000000740)=ANY=[@ANYBLOB="fc8d9d4608ef3a5516ff30b2225b947eeca4b8800000a9269f2e123cfc1c5d32fe465e21244b9256bc2657a254ca4993d7b201227ae33dbc3d3b672835c90ad97ad06a39c0ab41841f64bbd4145e9caaee3fc75cc8e335ec859a2b2817e26ed515"]) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000007c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000340)={0x6, 0x9}) socket$inet6(0xa, 0x6, 0xfffffffffffffc00) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) 03:05:47 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_SET_RESERVED_SIZE(r0, 0x2275, &(0x7f00000000c0)=0x10d060000) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r0, 0x0) 03:05:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0xffffbffeffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) 03:05:47 executing program 4: setrlimit(0x8, &(0x7f00000a3ff0)) r0 = socket(0x40000000015, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0x5) setreuid(0x0, r1) mlockall(0x3) 03:05:47 executing program 0: socket(0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_emit_ethernet(0x230, &(0x7f0000007000)={@local, @random="cf2bb43c40b8", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x222, 0x0, 0x0, 0x0, 0x21, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @tcp={{0x0, 0x0, 0x42424242, 0x42424242, 0x0, 0x3, 0x8}}}}}}, 0x0) 03:05:47 executing program 3: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) pipe(0x0) ioperm(0x8, 0x9d8d, 0x1b6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000002c0)={0x0, 0x4, 0x1140f3d0}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f0000000100)=0x8) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x10000, 0x2, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000765ffff040000000600395032303030"], 0x13) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in6}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000700)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000480)='bpf\x00', 0x2001, &(0x7f0000000740)=ANY=[@ANYBLOB="fc8d9d4608ef3a5516ff30b2225b947eeca4b8800000a9269f2e123cfc1c5d32fe465e21244b9256bc2657a254ca4993d7b201227ae33dbc3d3b672835c90ad97ad06a39c0ab41841f64bbd4145e9caaee3fc75cc8e335ec859a2b2817e26ed515"]) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000007c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000340)={0x6, 0x9}) socket$inet6(0xa, 0x6, 0xfffffffffffffc00) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) 03:05:47 executing program 5: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) pipe(0x0) ioperm(0x8, 0x9d8d, 0x1b6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000002c0)={0x0, 0x4, 0x1140f3d0}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f0000000100)=0x8) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x10000, 0x2, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000765ffff040000000600395032303030"], 0x13) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in6}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000700)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000480)='bpf\x00', 0x2001, &(0x7f0000000740)=ANY=[@ANYBLOB="fc8d9d4608ef3a5516ff30b2225b947eeca4b8800000a9269f2e123cfc1c5d32fe465e21244b9256bc2657a254ca4993d7b201227ae33dbc3d3b672835c90ad97ad06a39c0ab41841f64bbd4145e9caaee3fc75cc8e335ec859a2b2817e26ed515"]) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000007c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000340)={0x6, 0x9}) socket$inet6(0xa, 0x6, 0xfffffffffffffc00) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) [ 2952.780940][T11309] rpcbind: RPC call returned error 22 03:05:47 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0xffffbffeffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2952.924461][T25250] rpcbind: RPC call returned error 22 03:05:48 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r0, 0xc06855c8, 0x0) 03:05:48 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip6_mr_cache\x00') r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af10, &(0x7f0000000000)={0x0, r1}) [ 2953.830982][T11309] rpcbind: RPC call returned error 22 03:05:48 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) getpeername(r0, 0x0, 0x0) 03:05:48 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0xffffbffeffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) 03:05:48 executing program 1: perf_event_open(&(0x7f0000000600)={0x0, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x2df, 0x80000000000) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f00000006c0)={0x0, 0x10000, 0x7f, 0x200}, &(0x7f0000000700)=0x10) [ 2954.545064][ T26] kauditd_printk_skb: 240 callbacks suppressed [ 2954.545079][ T26] audit: type=1400 audit(1552187149.384:24625): avc: denied { map } for pid=30264 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2954.655571][ T26] audit: type=1400 audit(1552187149.424:24626): avc: denied { map } for pid=30264 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2800, 0x0) fstat(r1, &(0x7f0000000780)) bind$alg(r1, &(0x7f0000000b40)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) fsetxattr$trusted_overlay_opaque(r0, 0x0, &(0x7f0000000040)='y\x00', 0x2, 0x3) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r2, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r2, &(0x7f0000000600)=ANY=[], 0xfec8) recvmmsg(r2, &(0x7f0000007e00)=[{{&(0x7f0000001240)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f00000012c0)=""/167, 0xf}, {&(0x7f00000023c0)=""/49, 0x200023f1}, {&(0x7f0000003580)=""/4096, 0x1000}], 0x3, &(0x7f0000004780)=""/245, 0xf5}}], 0x30, 0x0, &(0x7f0000008000)={0x0, 0x989680}) [ 2954.783187][ T26] audit: type=1400 audit(1552187149.434:24627): avc: denied { map } for pid=30264 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:49 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet(r0, &(0x7f0000000580)="a3", 0x1, 0x0, 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)=ANY=[@ANYBLOB="858a030000000000000057ac008f6f4a34328382df63dd7b58d057d483c391c600c6fa0688a69404ba734e91f3813956096a5fb2bf3f35be7ac08e0cd1d437da199701800000000000000000e89bcbdd527b6d20602febf51a3c8ed0b2e8ebb8fc704b21856fa38356434b0ca7a8a800dd567d6e75250490540dab3c98836e20dd8181a2610ad4df0000000000000000000038ce7a2d53c877400f18d3358dcbf721d17ee438a394598d9469d8490509fa933b0ad5fafb7954d9a87ad8a42b5b507288f2d2d81676d4"], 0xc9) sendto$inet(r0, &(0x7f0000000740)="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", 0x340, 0x0, 0x0, 0x0) [ 2954.918821][T11309] rpcbind: RPC call returned error 22 [ 2954.979316][ T26] audit: type=1400 audit(1552187149.444:24628): avc: denied { map } for pid=30264 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:49 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000000a000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xa00000400, 0xffffbffeffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) [ 2955.022143][ T26] audit: type=1400 audit(1552187149.474:24629): avc: denied { map } for pid=30264 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2955.080880][ T26] audit: type=1400 audit(1552187149.474:24630): avc: denied { map } for pid=30238 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:50 executing program 1: timer_create(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, @thr={0x0, 0x0}}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, &(0x7f0000000040), 0x10000000000443) writev(r1, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r1, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 03:05:50 executing program 3: syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x0, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='pids.events\x00', 0x0, 0x0) pipe(0x0) ioperm(0x8, 0x9d8d, 0x1b6) ioctl$VIDIOC_S_FREQUENCY(0xffffffffffffffff, 0x402c5639, &(0x7f00000002c0)={0x0, 0x4, 0x1140f3d0}) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000080)={0x0, 0x1f}, &(0x7f0000000100)=0x8) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000240)={&(0x7f0000000140)='./file0\x00', 0x0, 0x10}, 0x10) ftruncate(r3, 0x1000000) sendfile(r2, r3, &(0x7f00000000c0)=0xf10001, 0xeffffdef) close(r2) ioctl$VIDIOC_S_FREQUENCY(r2, 0x402c5639, &(0x7f0000000200)={0x10000, 0x2, 0x1}) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-avx2\x00'}, 0x58) write$P9_RVERSION(r2, &(0x7f0000000400)=ANY=[@ANYBLOB="1300000765ffff040000000600395032303030"], 0x13) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@initdev, @in6}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f00000005c0)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000600)={{{@in=@broadcast}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000000700)=0xe8) mount$bpf(0x0, 0x0, &(0x7f0000000480)='bpf\x00', 0x2001, &(0x7f0000000740)=ANY=[@ANYBLOB="fc8d9d4608ef3a5516ff30b2225b947eeca4b8800000a9269f2e123cfc1c5d32fe465e21244b9256bc2657a254ca4993d7b201227ae33dbc3d3b672835c90ad97ad06a39c0ab41841f64bbd4145e9caaee3fc75cc8e335ec859a2b2817e26ed515"]) ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000007c0)=0x4) recvmmsg(0xffffffffffffffff, &(0x7f0000008a00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f0000000340)={0x6, 0x9}) socket$inet6(0xa, 0x6, 0xfffffffffffffc00) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, 0x0) 03:05:50 executing program 4: mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='squashfs\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = fcntl$dupfd(r0, 0x5, r0) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0xffffffffffffffff, 0x1ff, 0x4}}, 0xa) openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x2000, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000bc0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001380)=""/4096, 0x8c0a) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) lstat(&(0x7f0000000180)='./file0\x00', 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000240)={{{@in6=@ipv4, @in6=@mcast1}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000000340)=0xe8) getgroups(0x4, &(0x7f0000000380)=[0xee01, 0xee00, 0xee00, 0xffffffffffffffff]) getgroups(0x3, &(0x7f00000003c0)=[0xee01, 0xee01, 0xee00]) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)) fsetxattr$system_posix_acl(r0, &(0x7f0000000580)='system.poqih_acl_Pccess\x00', &(0x7f0000000500)=ANY=[@ANYBLOB], 0x1, 0x2) setresgid(0x0, r3, r4) recvfrom(r0, 0x0, 0x2ba, 0x40, 0x0, 0x0) [ 2955.273677][ T26] audit: type=1400 audit(1552187149.523:24631): avc: denied { map } for pid=30238 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2955.389038][ T26] audit: type=1400 audit(1552187149.523:24632): avc: denied { map } for pid=30238 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2955.512238][ T26] audit: type=1400 audit(1552187149.533:24633): avc: denied { map } for pid=30264 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f3188b070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000000)={@remote}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'syz_tun\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x4000000001c, &(0x7f00000001c0)={@remote, r2}, 0x14) [ 2955.647695][ T26] audit: type=1400 audit(1552187149.543:24634): avc: denied { map } for pid=30264 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") socketpair(0x8000000000001e, 0x1, 0x0, &(0x7f000000dff8)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) writev(r1, &(0x7f000063e000)=[{&(0x7f0000a66000)="da", 0x1}], 0x1) read(r2, &(0x7f0000000000)=""/253, 0xfd) [ 2955.966064][ T3673] rpcbind: RPC call returned error 22 03:05:50 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) syz_open_dev$midi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:05:51 executing program 1: r0 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r0, 0x29, 0x21, &(0x7f000089b000)=0xffffffffffffffff, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) 03:05:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000340)) ptrace(0x10, r1) ptrace$setregset(0x4, r1, 0x0, 0x0) 03:05:51 executing program 5: r0 = syz_open_dev$usb(&(0x7f00000003c0)='/dev/bus/usb/00#/00#\x00', 0x40000fffffb, 0x802) ioctl$FS_IOC_FSGETXATTR(r0, 0x40085511, &(0x7f0000000180)) [ 2956.987605][ C0] net_ratelimit: 26 callbacks suppressed [ 2956.987613][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2956.999084][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:05:51 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) syz_open_dev$midi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2957.068243][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2957.074042][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2957.079889][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2957.085658][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2957.149218][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2957.155050][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2957.160994][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2957.166779][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:05:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) syz_open_dev$midi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:05:52 executing program 3: syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000000)="0200a5ffffff01000000ff07000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 03:05:52 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') exit(0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 03:05:52 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)=@nullb='[d::]:0llb:\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='ceph\x00', 0x0, 0x0) 03:05:52 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x80803, 0x2f) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000040)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x80000002}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x8464}}, 0xe8) connect$inet6(r1, &(0x7f00000000c0), 0x1c) 03:05:52 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) syz_open_dev$midi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2958.325139][T31486] libceph: parse_ips bad ip '[d::]:0llb' 03:05:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) syz_open_dev$midi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:05:53 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000a00)={0x53, 0x0, 0x6, 0x20, @scatter={0x0, 0x0, 0x0}, &(0x7f00000000c0)="de9bb0eaffba", 0x0, 0x1, 0x10, 0x0, &(0x7f00000009c0)}) 03:05:53 executing program 1: syz_mount_image$ntfs(&(0x7f0000000080)='ntfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") socket$nl_route(0x10, 0x3, 0x0) ioctl$KVM_S390_UCAS_MAP(0xffffffffffffffff, 0x4018ae50, &(0x7f0000000140)={0x8, 0x5, 0x1}) 03:05:53 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) syz_open_dev$midi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 03:05:53 executing program 4: r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405) dup2(r0, r1) 03:05:53 executing program 5: r0 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x80000103) sendmsg(r0, &(0x7f0000000180)={&(0x7f0000000000)=@in={0x2, 0x4e23, @local}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000200)="b3", 0x1}], 0x1}, 0x0) [ 2959.590377][ T26] kauditd_printk_skb: 195 callbacks suppressed [ 2959.590393][ T26] audit: type=1400 audit(1552187154.395:24830): avc: denied { map } for pid=31792 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2959.722811][ T26] audit: type=1400 audit(1552187154.435:24831): avc: denied { map } for pid=31792 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f00003bbfc8)={&(0x7f0000fdbf80)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r0, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f0000000280)}}, 0x152610) close(r0) syz_open_dev$midi(0x0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 2959.879390][ T26] audit: type=1400 audit(1552187154.455:24832): avc: denied { map } for pid=31792 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:54 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt(0xffffffffffffffff, 0x114, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000300)='\xf6\xca\xb2\xb2!{\x15\x8e\x84\xb3\xd5\xd0\xb0\x16\xa0\xde\xcb\xaeQ\xe04<\xd1\x8d\xdf\xd5\xea\x1a5\xbd\xd7S@\x920\a\xda=\an\xb9\a`\xb0\x1b\xeb\xcb\xf3;\x7f\xa9\xbc\x16\xab\xe8\x06\x86E\xc8\xf3%\x7f\f\x1bQ:\x02\x00\x00\x00\xdb\x90\xfc\x9a\xafz\xba\xf6\x16\x02\x01\n\xefmt\x19\x8e;\xfcem\xae7\aQ\xf5\xfc\xf1\xa9\"\xb3\x02`5\"&\xe9\x95\xec\x065b', 0x0) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0xfffffffffffffffd, 0x1000) 03:05:54 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x8000008912, &(0x7f0000000140)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) [ 2960.037153][ T26] audit: type=1400 audit(1552187154.484:24833): avc: denied { map } for pid=31792 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2960.155286][ T26] audit: type=1400 audit(1552187154.504:24834): avc: denied { map } for pid=31792 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2960.302631][ T26] audit: type=1400 audit(1552187154.514:24835): avc: denied { map } for pid=31792 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:55 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d008100100f80ecdb4cb9047ec8650407007400000000fb120011010e000500090019a9060015000000", 0x2e}], 0x1}, 0x0) 03:05:55 executing program 4: mkdir(&(0x7f0000000700)='./file1\x00', 0x0) r0 = creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000040)) getuid() geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000740)={{{@in6=@mcast1, @in6=@mcast1}}, {{@in=@local}, 0x0, @in=@loopback}}, &(0x7f0000000380)=0xe8) getgid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000440), 0x0) fstat(r0, &(0x7f0000000980)) getgroups(0x5, &(0x7f0000000a00)=[0x0, 0xee01, 0x0, 0xee00, 0xffffffffffffffff]) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x0, 0x5}}, 0x20) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=./file1,workdir=./file1\x00']) chdir(&(0x7f0000000300)='./file0\x00') link(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file1\x00') [ 2960.455559][ T26] audit: type=1400 audit(1552187154.544:24836): avc: denied { map } for pid=31792 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2960.615511][ T26] audit: type=1400 audit(1552187154.544:24837): avc: denied { map } for pid=31792 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2960.789298][ T26] audit: type=1400 audit(1552187154.554:24838): avc: denied { map } for pid=31836 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2960.927341][ T26] audit: type=1400 audit(1552187154.564:24839): avc: denied { map } for pid=31836 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:05:55 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f00000000c0)='cpuset.cpus\x00', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000140)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x5) [ 2961.141700][T32296] netlink: 'syz-executor.2': attribute type 116 has an invalid length. 03:05:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000327f68)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000005500000000000000000000000000000005000900ed0000000a00000000000000fe8000000000000000000021000000ff000000000000000002000100000000000000050d0000000005000500000000000a00000000000000ff020000000000ec00000000000000010000000000000000"], 0x98}}, 0x0) [ 2961.269792][T32296] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 03:05:56 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 03:05:56 executing program 0: openat$mixer(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, 0x0) clone(0x7ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = getpid() exit_group(0x0) migrate_pages(r1, 0x2, 0x0, &(0x7f00000001c0)=0x1) 03:05:56 executing program 4: r0 = creat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$SIOCRSSL2CALL(r0, 0x89e2, &(0x7f0000000100)=@netrom) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x13f, 0x20}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, 0x0, 0x0) ioctl$VHOST_SET_MEM_TABLE(0xffffffffffffffff, 0x4008af03, 0x0) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f00000003c0)='asymmetric\x00', &(0x7f0000001ffb)={'\x05\x05\x00'}, &(0x7f0000001fee)='R\x0frcst\xe3c%sgrVex:De', 0x0) 03:05:56 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0", 0x2a, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x80800) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/249, 0xf9}], 0x1) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x5, 0x8c000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000640)=[@in6={0xa, 0x4e21, 0x7, @mcast1}, @in={0x2, 0x4e20, @rand_addr=0x9}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}], 0x3f3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value, 0x8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) 03:05:57 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x80005, 0x0) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000040)={0x0, 0x3}, 0x8) 03:05:57 executing program 3: syz_open_dev$media(0x0, 0x0, 0x40000) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000180)='security.ima\x00', &(0x7f0000000480)=ANY=[@ANYBLOB="4021296c8d116bf5a8d54e52138f1585358343b9f1ffe636dc346d2857deba5b658cbbb9ec30cfb3a4addc64bc93afaee3e0625c10b46920cb68db8e7a1a5515100eff1b8b52d2ee5d69fb073cc3b0394eb6171e8f90d4923bcc519c2d3a5e13b60bef6cf36cd37b0402fc662778fc17502eadd064403a739c795d15e3e29d8f26"], 0x1, 0x3) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000002c0)='yeah\x00', 0x5) bind$inet(r1, &(0x7f00000003c0)={0x2, 0x200000000004e23, @rand_addr=0x2}, 0x10) getsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000280)=0x80000000, 0x4) bind$netlink(0xffffffffffffffff, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000100), 0x4) timer_create(0x0, 0x0, 0x0) timer_gettime(0x0, 0x0) recvmsg(r1, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:05:57 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 03:05:57 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 03:05:57 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) [ 2963.276673][ C0] net_ratelimit: 26 callbacks suppressed [ 2963.276681][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2963.288209][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2963.357296][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2963.363104][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2963.369011][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2963.374786][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2963.437960][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2963.443794][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2963.449663][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2963.455451][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:05:58 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0", 0x2a, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x80800) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/249, 0xf9}], 0x1) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x5, 0x8c000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000640)=[@in6={0xa, 0x4e21, 0x7, @mcast1}, @in={0x2, 0x4e20, @rand_addr=0x9}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}], 0x3f3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value, 0x8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) 03:05:58 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, r1}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@dev, 0x0, 0x0, 0x0, 0x1}}, 0xe8) sendmmsg(r0, &(0x7f0000002000)=[{{&(0x7f0000000740)=@in={0x2, 0xc67a}, 0x80, 0x0}}], 0x1, 0x0) 03:05:58 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 03:05:59 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 03:05:59 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) 03:05:59 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f0000000140)='\x00\x00\x00\x00\x8c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) [ 2964.655870][ T26] kauditd_printk_skb: 214 callbacks suppressed [ 2964.655882][ T26] audit: type=1400 audit(1552187159.416:25054): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2964.812901][ T26] audit: type=1400 audit(1552187159.425:25055): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2964.919357][ T26] audit: type=1400 audit(1552187159.425:25056): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:05:59 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0", 0x2a, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x80800) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/249, 0xf9}], 0x1) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x5, 0x8c000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000640)=[@in6={0xa, 0x4e21, 0x7, @mcast1}, @in={0x2, 0x4e20, @rand_addr=0x9}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}], 0x3f3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value, 0x8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) [ 2965.109814][ T26] audit: type=1400 audit(1552187159.425:25057): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2965.256533][ T26] audit: type=1400 audit(1552187159.475:25058): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:00 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) [ 2965.498741][ T26] audit: type=1400 audit(1552187159.545:25059): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) 03:06:00 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) [ 2965.640361][ T26] audit: type=1400 audit(1552187159.554:25060): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:00 executing program 4: r0 = syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x1, 0x0) r2 = gettid() r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)='cpuset\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(0xffffffffffffffff, 0x0, 0x485, 0x0, 0x0) clone(0x7ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000240), 0xffffffffffffffff) clone(0x2102001fec, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) exit_group(0x0) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000300), 0x4) socket$inet_udplite(0x2, 0x2, 0x88) ptrace$peek(0x41de7f9ba49b3f3f, r2, &(0x7f0000000200)) sendmmsg$alg(r3, &(0x7f0000000cc0)=[{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="5c50ed97ab73d8e2d30b7f85625ddd060b5f1bd895a5a82a6a66de1dc3c1dfb0785ad886862bf62e2196d4ac223710737731290724d755ee0353ba99cb43", 0x3e}], 0x1}], 0x1, 0x8000) wait4(0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)) r4 = open(&(0x7f0000000000)='./file0\x00', 0x2001, 0x1bd) write$tun(r4, &(0x7f0000000240)={@void, @val={0x2, 0x81, 0x4, 0x9, 0x2, 0x1}, @ipv4={{0x6, 0x4, 0x0, 0x7, 0x42, 0x66, 0x6, 0x30c3, 0xae, 0x0, @multicast1, @multicast1, {[@noop]}}, @igmp={0x14, 0xffffffffffffffc1, 0x0, @multicast1, "7bf9d96a8ade15d876e37113e61630a525a2618d14cd66a160b69a3f5f76a36cfa36"}}}, 0x4c) socket$vsock_stream(0x28, 0x1, 0x0) r5 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f0000000100)) epoll_pwait(r4, &(0x7f0000000d40)=[{}, {}, {}, {}, {}, {}], 0x6, 0x40, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(0xffffffffffffffff, 0xc0505510, 0x0) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, 0x0, &(0x7f00000002c0)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r4, 0xc08c5334, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) ioctl$VIDIOC_DV_TIMINGS_CAP(r6, 0xc0905664, &(0x7f0000000040)={0x0, 0x0, [], @bt={0x6, 0x7fff, 0x650, 0x0, 0xffff, 0x2, 0x1, 0x1}}) ioctl$NBD_SET_FLAGS(r0, 0xab0a, 0x0) [ 2965.775284][ T26] audit: type=1400 audit(1552187159.554:25061): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:00 executing program 5: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, &(0x7f00000002c0)={0x0, 0xa97, 0x4, {0x200000000001, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xbc]}}}) [ 2965.914790][ T26] audit: type=1400 audit(1552187159.584:25062): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2966.013780][ T26] audit: type=1400 audit(1552187159.614:25063): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:01 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) 03:06:01 executing program 0: openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) sendmsg$TIPC_NL_PUBL_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) add_key(0x0, &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000001a80)="b7feb58638d4bf8dfafcdf7772f14b127341adba280fd79cc810085b0ac4a6bfbb03a22eb9a4958ee8a0", 0x2a, 0xfffffffffffffff8) getegid() ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000200)=ANY=[]) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x0, 0x80800) timerfd_settime(r0, 0x3, &(0x7f0000000080)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/249, 0xf9}], 0x1) unshare(0x20600) prctl$PR_CAPBSET_READ(0x17, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000240)='/dev/amidi#\x00', 0x5, 0x8c000) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000640)=[@in6={0xa, 0x4e21, 0x7, @mcast1}, @in={0x2, 0x4e20, @rand_addr=0x9}, @in={0x2, 0x4e24, @remote}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x4}, @in={0x2, 0x4e21, @loopback}], 0x3f3) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f0000000340)=@assoc_value, 0x8) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x101, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0x4) 03:06:01 executing program 1: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x280000000006, 0x0) ioctl$VIDIOC_S_SELECTION(r0, 0xc040565f, &(0x7f0000000080)={0x2, 0x0, 0x3, {0x0, 0x0, 0x5, 0x8}}) 03:06:01 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4), 0xc) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080)=0x9, 0x4) r2 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r2, &(0x7f0000000100)=[{&(0x7f0000000140)="580000001400192340834b80043f679a10ff00804824ca945f640094000500289d5aaa000000000000008449bb06d383d537b300f0fffeff2c707f8f00ff200000000010000100090a000000000000000000000000000000", 0x58}], 0x1) 03:06:02 executing program 4: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:06:02 executing program 5: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") setsockopt$X25_QBITINCL(r0, 0x106, 0x1, 0x0, 0x300) 03:06:02 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x12, 0x3, &(0x7f0000000000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x57}}, &(0x7f0000000080)='M[Z\xf2\xa4\nf07\xc3Ju-\x01\xc2W\x88\x86\xe1=\x85-\xf6\xd3\xf2a|\xa6\x1f\x97\xbe?8\xec\x93\a[\x03\x00\x00\x00\x00\x00\x00\x00\x8a\xc40\x83\xd5\b\x1d\xc7o\xbb\xec\x87\xdf\xd4\x9c\xa7s\xbf\xfd\xdc\xc9\xffI\x82r\x90\x05\xb5\a\xec`VY\x94}\xbfMF\x84xR+\xb9ZmFW\xe39+s\xa16\xff\xb5 \xa4d\x1bm=\xa2\xa1`\"\xaf\xe4\x9b\xd8\xcb\xb3\x82D\xc2\xa4>\xda\t\x00\x00\x00\x00\x00\x00\x7f\xd0/LS\xdf\xd4\xc7\x91S\xb7\x1f\f\xbe\xde4F+\x85\xb4\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x1, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], 0x0, 0x8}, 0x5a) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r0, 0xff04, &(0x7f0000000040)}, 0xe) 03:06:02 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d00080000001000034000030000053582c137153e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) [ 2969.565781][ C0] net_ratelimit: 26 callbacks suppressed [ 2969.565791][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2969.577320][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2969.646362][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2969.652168][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2969.658088][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2969.663877][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2969.726966][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2969.732814][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2969.738751][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2969.744542][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:06:04 executing program 3: socketpair$unix(0x1, 0x1000000000000005, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) unlinkat(0xffffffffffffffff, 0x0, 0x1fe) 03:06:04 executing program 4: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f00000008c0)="1300000010b0ffdde200f49ff60f050000230a", 0x13) 03:06:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f0000000100)=""/147, 0x20000}, 0x18) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0xffffffffffffffa2, &(0x7f00000000c0), 0x282, &(0x7f0000000000)=[@rights={0x18, 0x1, 0x1, [r1, r0]}], 0x18}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f00000000c0), 0x4) recvmmsg(r1, &(0x7f0000000380), 0x40000000000020a, 0x53a, &(0x7f0000002cc0)={0x0, 0x1c9c380}) 03:06:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d00080000001000034000030000053582c137153e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) 03:06:04 executing program 5: mmap$binder(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x2031, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x20000000084) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000001200)={'nat\x00', 0x0, 0x0, 0x90, [], 0x0, &(0x7f00000001c0), &(0x7f0000000200)=""/4096}, &(0x7f0000001280)=0x108) 03:06:04 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) connect(r4, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x80000, 0x0) ftruncate(r3, 0x1000000) signalfd(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000200)="1f656e53ffc02217625961fd353ff360e9da9543b8923adccd62bcd02309ed948083af8604be10323bcdcdaa2d166edf451d7b0a95d6775f6a4f0d3a68ada54be0e00d975a2c01007c68e3a08da94ac8b76abd647cae01755677cfed2c7bccbcafff11697fc5f1450cc6b3fdf7e45023e17fb2e12f88075ed72afa9508ef35aa", 0x80}], 0x1}, 0x4) inotify_init() getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000004c0)={@rand_addr, @multicast2}, &(0x7f0000000500)=0x8) sendfile(r2, r3, &(0x7f00000000c0)=0xf10600, 0xeffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0xe10) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000c80)) close(r2) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000280)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000480)) readahead(r1, 0x3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x168, 0x0, 0x0, 0x0, 0x0, 0x0}) write$nbd(r5, &(0x7f0000000640)=ANY=[], 0x0) read(r5, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) [ 2970.032314][ T26] kauditd_printk_skb: 167 callbacks suppressed [ 2970.032329][ T26] audit: type=1400 audit(1552187164.754:25231): avc: denied { create } for pid=2438 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 2970.194253][ T26] audit: type=1400 audit(1552187164.823:25232): avc: denied { write } for pid=2438 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:06:04 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d00080000001000034000030000053582c137153e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) 03:06:04 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f0000000100)=""/147, 0x20000}, 0x18) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0xffffffffffffffa2, &(0x7f00000000c0), 0x282, &(0x7f0000000000)=[@rights={0x18, 0x1, 0x1, [r1, r0]}], 0x18}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f00000000c0), 0x4) recvmmsg(r1, &(0x7f0000000380), 0x40000000000020a, 0x53a, &(0x7f0000002cc0)={0x0, 0x1c9c380}) 03:06:05 executing program 4: shmctl$SHM_UNLOCK(0x0, 0xffffffffffffffff) [ 2970.320157][ T26] audit: type=1400 audit(1552187164.873:25233): avc: denied { create } for pid=2440 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:06:05 executing program 5: clone(0x4000003102041ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) [ 2970.437269][ T26] audit: type=1400 audit(1552187164.883:25234): avc: denied { write } for pid=2440 comm="syz-executor.4" path="socket:[179422]" dev="sockfs" ino=179422 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2970.583807][ T26] audit: type=1400 audit(1552187164.892:25235): avc: denied { write } for pid=2440 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2970.684471][ T26] audit: type=1400 audit(1552187164.942:25236): avc: denied { create } for pid=2440 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 2970.856849][ T26] audit: type=1400 audit(1552187165.220:25237): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:05 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) connect(r4, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x80000, 0x0) ftruncate(r3, 0x1000000) signalfd(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000200)="1f656e53ffc02217625961fd353ff360e9da9543b8923adccd62bcd02309ed948083af8604be10323bcdcdaa2d166edf451d7b0a95d6775f6a4f0d3a68ada54be0e00d975a2c01007c68e3a08da94ac8b76abd647cae01755677cfed2c7bccbcafff11697fc5f1450cc6b3fdf7e45023e17fb2e12f88075ed72afa9508ef35aa", 0x80}], 0x1}, 0x4) inotify_init() getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000004c0)={@rand_addr, @multicast2}, &(0x7f0000000500)=0x8) sendfile(r2, r3, &(0x7f00000000c0)=0xf10600, 0xeffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0xe10) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000c80)) close(r2) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000280)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000480)) readahead(r1, 0x3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x168, 0x0, 0x0, 0x0, 0x0, 0x0}) write$nbd(r5, &(0x7f0000000640)=ANY=[], 0x0) read(r5, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 03:06:05 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000002e008183ad5de0713c444d00080000001000034000030000053582c137153e370000000000000000d1bd", 0x2e}], 0x1}, 0x0) [ 2971.037341][ T26] audit: type=1400 audit(1552187165.250:25238): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2971.202037][ T26] audit: type=1400 audit(1552187165.260:25239): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2971.354462][ T26] audit: type=1400 audit(1552187165.260:25240): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f0000000100)=""/147, 0x20000}, 0x18) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0xffffffffffffffa2, &(0x7f00000000c0), 0x282, &(0x7f0000000000)=[@rights={0x18, 0x1, 0x1, [r1, r0]}], 0x18}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f00000000c0), 0x4) recvmmsg(r1, &(0x7f0000000380), 0x40000000000020a, 0x53a, &(0x7f0000002cc0)={0x0, 0x1c9c380}) 03:06:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000005c0)={0x1, 0x0, @ioapic={0xd000, 0xfffffffeffffffff, 0x0, 0x0, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x8000}]}}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) getresgid(0x0, 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[], 0x0, 0x680}) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_PEER_REMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:06:06 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000280)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f00000001c0)={{}, 'syz0\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 03:06:06 executing program 5: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000040)={0x1, 0x0, {0x0, 0x0, 0x0, 0x1f, 0x0, 0x60}}) 03:06:06 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) connect(r4, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x80000, 0x0) ftruncate(r3, 0x1000000) signalfd(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000200)="1f656e53ffc02217625961fd353ff360e9da9543b8923adccd62bcd02309ed948083af8604be10323bcdcdaa2d166edf451d7b0a95d6775f6a4f0d3a68ada54be0e00d975a2c01007c68e3a08da94ac8b76abd647cae01755677cfed2c7bccbcafff11697fc5f1450cc6b3fdf7e45023e17fb2e12f88075ed72afa9508ef35aa", 0x80}], 0x1}, 0x4) inotify_init() getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000004c0)={@rand_addr, @multicast2}, &(0x7f0000000500)=0x8) sendfile(r2, r3, &(0x7f00000000c0)=0xf10600, 0xeffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0xe10) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000c80)) close(r2) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000280)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000480)) readahead(r1, 0x3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x168, 0x0, 0x0, 0x0, 0x0, 0x0}) write$nbd(r5, &(0x7f0000000640)=ANY=[], 0x0) read(r5, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 03:06:06 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) connect(r4, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x80000, 0x0) ftruncate(r3, 0x1000000) signalfd(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000200)="1f656e53ffc02217625961fd353ff360e9da9543b8923adccd62bcd02309ed948083af8604be10323bcdcdaa2d166edf451d7b0a95d6775f6a4f0d3a68ada54be0e00d975a2c01007c68e3a08da94ac8b76abd647cae01755677cfed2c7bccbcafff11697fc5f1450cc6b3fdf7e45023e17fb2e12f88075ed72afa9508ef35aa", 0x80}], 0x1}, 0x4) inotify_init() getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000004c0)={@rand_addr, @multicast2}, &(0x7f0000000500)=0x8) sendfile(r2, r3, &(0x7f00000000c0)=0xf10600, 0xeffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0xe10) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000c80)) close(r2) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000280)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000480)) readahead(r1, 0x3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x168, 0x0, 0x0, 0x0, 0x0, 0x0}) write$nbd(r5, &(0x7f0000000640)=ANY=[], 0x0) read(r5, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 03:06:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b00)=@newlink={0x3c, 0x10, 0x621, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}]}, 0x3c}}, 0x0) 03:06:06 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f00000001c0)={&(0x7f0000000100)=""/147, 0x20000}, 0x18) sendmsg$netlink(r0, &(0x7f0000000480)={0x0, 0xffffffffffffffa2, &(0x7f00000000c0), 0x282, &(0x7f0000000000)=[@rights={0x18, 0x1, 0x1, [r1, r0]}], 0x18}, 0x0) setsockopt$sock_int(r1, 0x1, 0x2a, &(0x7f00000000c0), 0x4) recvmmsg(r1, &(0x7f0000000380), 0x40000000000020a, 0x53a, &(0x7f0000002cc0)={0x0, 0x1c9c380}) 03:06:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) connect(r4, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x80000, 0x0) ftruncate(r3, 0x1000000) signalfd(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000200)="1f656e53ffc02217625961fd353ff360e9da9543b8923adccd62bcd02309ed948083af8604be10323bcdcdaa2d166edf451d7b0a95d6775f6a4f0d3a68ada54be0e00d975a2c01007c68e3a08da94ac8b76abd647cae01755677cfed2c7bccbcafff11697fc5f1450cc6b3fdf7e45023e17fb2e12f88075ed72afa9508ef35aa", 0x80}], 0x1}, 0x4) inotify_init() getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000004c0)={@rand_addr, @multicast2}, &(0x7f0000000500)=0x8) sendfile(r2, r3, &(0x7f00000000c0)=0xf10600, 0xeffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0xe10) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000c80)) close(r2) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000280)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000480)) readahead(r1, 0x3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x168, 0x0, 0x0, 0x0, 0x0, 0x0}) write$nbd(r5, &(0x7f0000000640)=ANY=[], 0x0) read(r5, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 03:06:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000200)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000100), 0x28) recvmmsg(r0, &(0x7f0000002fc0)=[{{&(0x7f0000000900)=@alg, 0x80, &(0x7f0000002a80)=[{&(0x7f0000000280)=""/124, 0xfeab}, {&(0x7f0000000780)=""/217}, {&(0x7f0000000980)=""/241}, {&(0x7f0000000a80)=""/4096}, {&(0x7f0000001a80)=""/4096}, {&(0x7f0000000880)=""/70}, {&(0x7f0000000300)=""/54}], 0x0, &(0x7f0000000340)=""/160, 0xa0}}], 0x569, 0x0, &(0x7f00000001c0)={0x77359400}) 03:06:07 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) connect(r4, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x80000, 0x0) ftruncate(r3, 0x1000000) signalfd(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000200)="1f656e53ffc02217625961fd353ff360e9da9543b8923adccd62bcd02309ed948083af8604be10323bcdcdaa2d166edf451d7b0a95d6775f6a4f0d3a68ada54be0e00d975a2c01007c68e3a08da94ac8b76abd647cae01755677cfed2c7bccbcafff11697fc5f1450cc6b3fdf7e45023e17fb2e12f88075ed72afa9508ef35aa", 0x80}], 0x1}, 0x4) inotify_init() getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000004c0)={@rand_addr, @multicast2}, &(0x7f0000000500)=0x8) sendfile(r2, r3, &(0x7f00000000c0)=0xf10600, 0xeffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0xe10) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000c80)) close(r2) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000280)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000480)) readahead(r1, 0x3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x168, 0x0, 0x0, 0x0, 0x0, 0x0}) write$nbd(r5, &(0x7f0000000640)=ANY=[], 0x0) read(r5, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) 03:06:07 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x34, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x32, 0xffffffffffffffff, 0x0) ioctl$int_out(r0, 0x20000008c0385720, &(0x7f0000000080)) 03:06:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b00)=@newlink={0x3c, 0x10, 0x621, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}]}, 0x3c}}, 0x0) 03:06:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x400002200006008, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x2, 0x31, 0xffffffffffffffff, 0x0) ioctl$BLKALIGNOFF(r1, 0x127b, &(0x7f0000000000)) 03:06:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") mount(&(0x7f0000000000)=@sg0='ubi7_0x0\x00', &(0x7f0000000380)='.', &(0x7f0000fdb000)='ubifs\x00', 0x0, 0x0) 03:06:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b00)=@newlink={0x3c, 0x10, 0x621, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}]}, 0x3c}}, 0x0) 03:06:08 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_IRQ_LINE(r1, 0x4008ae61, &(0x7f0000000100)={0xfffffffffffffffb}) 03:06:08 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8b36, &(0x7f0000000000)='wlan0\x00\xd3\xeb\'\xe4\xd5\xd1s\b\x8c\xba\x01x\xc5\xa4\x9f\x1f\x00\x00$\x00\x00\x00 \x1cs\n\xcc]\xfb\xe9i]\xb9\xfc\xae\xd03\x00\x00\x00\x00\x00\x00\x00\b\xb4\x8f\x03\x00\x00\xf6L\x00\x00\xd5\x98\xba\xc4n\xd4\xf3(eq]\x812\xc3\x8e\x88\x00\x00\x00\x00\x00\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') 03:06:08 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000600)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000001280)='/dev/vbi#\x00', 0x3, 0x2) r3 = memfd_create(&(0x7f0000000000)='\xac\x00\x00', 0x4) r4 = socket$l2tp(0x18, 0x1, 0x1) connect(r4, &(0x7f0000000040)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x32) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000340)={&(0x7f0000000140)='./file0\x00', r2}, 0x10) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000540)='/dev/cachefiles\x00', 0x80000, 0x0) ftruncate(r3, 0x1000000) signalfd(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(r2, &(0x7f0000000440)={&(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000200)="1f656e53ffc02217625961fd353ff360e9da9543b8923adccd62bcd02309ed948083af8604be10323bcdcdaa2d166edf451d7b0a95d6775f6a4f0d3a68ada54be0e00d975a2c01007c68e3a08da94ac8b76abd647cae01755677cfed2c7bccbcafff11697fc5f1450cc6b3fdf7e45023e17fb2e12f88075ed72afa9508ef35aa", 0x80}], 0x1}, 0x4) inotify_init() getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000004c0)={@rand_addr, @multicast2}, &(0x7f0000000500)=0x8) sendfile(r2, r3, &(0x7f00000000c0)=0xf10600, 0xeffffdef) ioctl$int_in(r2, 0x5452, &(0x7f0000000080)=0xe10) ioctl$GIO_CMAP(0xffffffffffffffff, 0x4b70, &(0x7f0000000c80)) close(r2) r5 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r5, 0x400445a0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r2, 0x4008af60, &(0x7f0000000280)) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000400)) getsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, 0x0, &(0x7f0000000480)) readahead(r1, 0x3, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000100)={0x168, 0x0, 0x0, 0x0, 0x0, 0x0}) write$nbd(r5, &(0x7f0000000640)=ANY=[], 0x0) read(r5, 0x0, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) [ 2973.894804][ T3566] UBIFS error (pid: 3566): cannot open "ubi7_0x0", error -19 03:06:09 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x800000000a) write$P9_RATTACH(r0, &(0x7f0000000100)={0x14}, 0x14) 03:06:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b00)=@newlink={0x3c, 0x10, 0x621, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @gretap={{0xc, 0x1, 'gretap\x00'}, {0xc, 0x2, [@IFLA_GRE_REMOTE={0x8, 0x7, @remote}]}}}]}, 0x3c}}, 0x0) 03:06:09 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") clone(0x3102001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() pselect6(0x121, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x5) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x2, 0x0, 0x0, 0x80100000000c, 0xfa}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r1, 0x0, 0x0) 03:06:09 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0x2, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x19}, 0x98) 03:06:09 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0x3, {0x0, 0x0}}, 0x20) 03:06:09 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x2a, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', @ANYPTR, @ANYPTR=&(0x7f0000000240)=ANY=[]], 0x0, 0x0, 0x0}) [ 2975.361047][ T26] kauditd_printk_skb: 177 callbacks suppressed [ 2975.361062][ T26] audit: type=1400 audit(1552187170.032:25418): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2975.506720][ T26] audit: type=1400 audit(1552187170.042:25419): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2975.667009][ T26] audit: type=1400 audit(1552187170.072:25420): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2975.821041][ T26] audit: type=1400 audit(1552187170.072:25421): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2975.851864][ T4026] binder: 4017:4026 transaction failed 29189/-22, size 8192-0 line 2994 [ 2975.864862][ C0] net_ratelimit: 26 callbacks suppressed [ 2975.864870][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2975.876338][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2975.935417][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2975.938298][T16918] binder: undelivered TRANSACTION_ERROR: 29189 [ 2975.941213][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2975.941306][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2975.959231][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2975.982258][ T26] audit: type=1400 audit(1552187170.121:25422): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2976.016075][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2976.021875][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2976.027757][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2976.033555][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:06:10 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000001480)=""/4096, 0x1000}], 0x1}, 0x0) 03:06:10 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000140)={0x6, @sliced}) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = syz_open_dev$sndctrl(&(0x7f00000000c0)='/dev/snd/controlC#\x00', 0x0, 0x480) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x81, 0x0, 0x10000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x80001, 0x100000000000000) select(0x40, &(0x7f00000000c0)={0x8, 0x2, 0x5, 0xb60, 0xa, 0x5, 0xd816, 0x7}, &(0x7f0000000100)={0x314018d, 0x3, 0x937f, 0x2, 0x7fff, 0xfffffffeffffffff, 0xff, 0x8004}, &(0x7f0000000240)={0x4, 0xb83, 0x2, 0x6e, 0x8, 0x8, 0x8000, 0x61f}, &(0x7f0000000300)={0x0, 0x2710}) r5 = syz_open_procfs(0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r5, 0x40bc5311, &(0x7f0000000740)={0xfffffffffffffffa, 0x0, 'client0\x00', 0x1, "e1d256d46d222d65", "a7071dd3bfac2c919a1784718102c63ed6241a19fe23a5f46acf6241f7a00bbb", 0x0, 0x8}) read(r3, &(0x7f0000000ac0)=""/245, 0xffffffffffffff9d) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000880)) ioctl$EXT4_IOC_SETFLAGS(r3, 0x40046602, &(0x7f0000000800)=0x4084000) r6 = syz_open_dev$dri(&(0x7f0000000480)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r5, 0x4048ae9b, &(0x7f0000000040)={0x3, 0x0, [0x9, 0x8, 0x4009, 0xffffffffffff14af, 0x10000, 0x8, 0xff, 0xffff]}) linkat(r5, &(0x7f0000000680)='./file0\x00', r5, &(0x7f0000000580)='./file0\x00', 0x1400) fcntl$getownex(r4, 0x10, &(0x7f0000000200)={0x0, 0x0}) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000000)={0xff, @multicast1, 0x0, 0x3, 'dh\x00', 0x20, 0x80000000, 0x17}, 0x2c) r8 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000840)='/dev/sequencer2\x00', 0x200880, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x23e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x4000000000, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xfffffffffffffff8}, 0x0, 0x0, 0x0, 0x0, 0x20000}, r7, 0x0, 0xffffffffffffffff, 0x0) r9 = perf_event_open(&(0x7f0000001000)={0x0, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8ce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000005000), 0x2}, 0x1000000000c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r9, 0x40305828, &(0x7f0000000540)={0x0, 0x1, 0x2, 0x1}) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r2, 0xc0045516, &(0x7f0000000080)=0x8001) ioctl$UI_DEV_DESTROY(r8, 0x5502) ioctl$SNDRV_CTL_IOCTL_PVERSION(r2, 0xc0405519, &(0x7f0000001000)) syz_open_dev$mice(&(0x7f0000000340)='/dev/input/mice\x00', 0x0, 0x201) ioctl(r1, 0x8912, &(0x7f0000000280)="15d70f80488dd25d796070") ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x2) bind$unix(r6, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) socket$nl_xfrm(0x10, 0x3, 0x6) 03:06:10 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) writev(r0, &(0x7f0000fb5ff0)=[{&(0x7f0000000000)="1f00000002031900000007000000068100022b0509000100010100ff3ffe58", 0x1f}], 0x1) r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000fb5ff0)=[{&(0x7f0000fb4000)="1f00000001031900000007000000068100023b0509000100010100ff3ffe58", 0x1f}], 0x1) [ 2976.078543][ T26] audit: type=1400 audit(1552187170.151:25423): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:10 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000001703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)='P\\\x88\x1c'}, 0x48) 03:06:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='children\x00') r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x2, 0x80) r2 = syz_open_dev$sndseq(0x0, 0x0, 0x7e) pipe(&(0x7f0000000880)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000080)={'irlan0\x00', {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}) fstat(r2, &(0x7f0000000240)) write(r4, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x4, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0}, 0x20) epoll_create1(0x80000) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) clone(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNGETFEATURES(r0, 0x800454cf, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, &(0x7f0000000180)={0x100000000, {0x100000000, 0x8, 0x286, 0xe00b, 0x80000000, 0x78}}) ioctl$sock_netrom_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000400)={0x1, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bpq0='bpq0\x00', 0x80, 'syz0\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x1, 0x4, [@null, @bcast, @remote, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}) ioctl$PPPIOCDISCONN(0xffffffffffffffff, 0x7439) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f3188b070") r7 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) r9 = ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r8, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) mmap$perf(&(0x7f0000033000/0x1000)=nil, 0x1000, 0x0, 0x13, r4, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r9, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@text32={0x20, &(0x7f0000000040)="a0dabd00000f9c5209b9800000c00f3235000100000f303e660f3a15f1440fc768010fc76ef20f090f01f366baa100ec0f019d58000000", 0x37}], 0x1, 0x0, 0x0, 0xfffffffffffffec6) 03:06:10 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x2100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000400)) listen(r0, 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x1a0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380), 0x117, 0x5}}, 0x20) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 2976.298316][ T26] audit: type=1400 audit(1552187170.151:25424): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2976.439874][ T26] audit: type=1400 audit(1552187170.161:25425): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2976.551911][ T26] audit: type=1400 audit(1552187170.171:25426): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2976.599615][ T4029] audit: audit_backlog=65 > audit_backlog_limit=64 03:06:11 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000001703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)='P\\\x88\x1c'}, 0x48) [ 2976.727708][ T4105] IPVS: set_ctl: invalid protocol: 255 224.0.0.1:0 03:06:11 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000ae6fc7)="390000001100094701bb61e1c3050001070000000400000045efffff08009b0019001a000f001800220001071c06000004e9ff0004000d0005", 0x39}], 0x1) 03:06:11 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000340)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@SEG6_ATTR_ALGID={0x8}, @SEG6_ATTR_SECRETLEN={0x8}, @SEG6_ATTR_HMACKEYID={0x8}]}, 0x2c}}, 0x0) 03:06:12 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000001703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)='P\\\x88\x1c'}, 0x48) [ 2977.417826][ T4310] IPVS: set_ctl: invalid protocol: 255 224.0.0.1:0 03:06:12 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000ae6fc7)="390000001100094701bb61e1c3050001070000000400000045efffff08009b0019001a000f001800220001071c06000004e9ff0004000d0005", 0x39}], 0x1) 03:06:12 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x2100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000400)) listen(r0, 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x1a0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380), 0x117, 0x5}}, 0x20) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 2977.753772][ T4361] netlink: 'syz-executor.1': attribute type 6 has an invalid length. [ 2977.795750][ T4361] netlink: 'syz-executor.1': attribute type 5 has an invalid length. 03:06:13 executing program 3: r0 = socket$inet6(0xa, 0x20400000080002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@dev, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000080)={@mcast1, 0x0, 0x0, 0x2, 0x1}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000002c0)={@rand_addr="41e138e350aaf513344a0b15372badaa", 0x800, 0x1}, 0x20) 03:06:13 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:06:13 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0xe, &(0x7f0000000140)=ANY=[@ANYBLOB="b700000000000100bfa30000000000001703000028feffff7a0af0fff8ffffff79a4f0ff00000000b7060000000000013d400300000000006506000001ed00001c040000000000006f460000000000006a0a00fe00000000850000002e000000b7000000000000009500000000000000"], &(0x7f0000000100)='P\\\x88\x1c'}, 0x48) 03:06:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000ae6fc7)="390000001100094701bb61e1c3050001070000000400000045efffff08009b0019001a000f001800220001071c06000004e9ff0004000d0005", 0x39}], 0x1) 03:06:13 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000003c0)='./file0/f.le.\x00') linkat(r2, &(0x7f0000000000)='./file0/f.le.\x00', r2, &(0x7f0000000180)='.//ile0\x00', 0x0) 03:06:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000ae6fc7)="390000001100094701bb61e1c3050001070000000400000045efffff08009b0019001a000f001800220001071c06000004e9ff0004000d0005", 0x39}], 0x1) 03:06:13 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x2) r3 = dup2(r2, r1) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) openat$cgroup_subtree(r0, 0x0, 0x2, 0x0) msgget(0x1, 0x240) stat(&(0x7f0000000180)='./bus\x00', &(0x7f0000000380)) getresgid(0x0, 0x0, 0x0) lstat(0x0, &(0x7f0000000640)) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r3, 0x40bc5311, &(0x7f0000000000)={0x0, 0x0, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) write$sndseq(r1, &(0x7f0000042f70)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x30) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='pagemap\x00\x9c\xcd\xbf:\xa4\xe1\x99+\xfa\xbam\x9f+\x88\x06\xb9\x03\x03\xfff\x15cZ\x9ak\x06`\x01\x18{\xa9FqK\ro\xd0\x92\xd7\xe8\xbf\r\x99\x94Z7??\x01\xa5\xc9J\x90\xa7\xa7\x04\xe9\xde\xb9\xb4(\x9e\x81\x81\x02\xbb\xf22\xc3\xd3\xfe\xdf\x8a\x1e\xa2g\xc5\"Z\xd6\v\xd0\x8ef\x15\xc1\x89\xe56r\xec\xf3\x9e%\xf5\x8d\xb3\xe7\x97a\xb6Uk\xa5\x97\xf3\x06\x01\x97B\xfe\xfe\x81s\xbdY') creat(&(0x7f0000000140)='./bus\x00', 0x20000) keyctl$clear(0x7, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r4, 0x84, 0x7b, &(0x7f0000000200)={0x0, 0x4}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f0000000100), 0x8) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f00000017c0)={r5, 0x5}, &(0x7f0000001800)=0x8) ioctl$sock_inet6_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) r6 = socket$inet(0x2, 0x806, 0x0) setsockopt$inet_opts(r6, 0x0, 0x4, &(0x7f00000000c0)="8907040400", 0x5) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f0000000400)=""/50) connect$inet(r6, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) 03:06:14 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x2100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000400)) listen(r0, 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x1a0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380), 0x117, 0x5}}, 0x20) rmdir(&(0x7f0000000340)='./file0//ile0\x00') 03:06:14 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="eb280a1a75511eb82753cf3edb473d6a", 0x10) close(r0) 03:06:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400192340834b80040d8c560a067fffffff81004e220000000058000b4824ca945f64009400050028925aa8000000000000ff7f00f0fffeffe809000000fff5dd001b2f10000100070abd00000154000000fcff", 0x58}], 0x1) 03:06:14 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x80800) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_int(r1, 0x29, 0x0, &(0x7f0000000ffc), &(0x7f0000013000)=0xfffffffffffffd7a) ppoll(&(0x7f0000000380)=[{r0}], 0x1, &(0x7f00000003c0), &(0x7f0000000400), 0x8) 03:06:14 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:06:14 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 2980.412454][ T26] kauditd_printk_skb: 209 callbacks suppressed [ 2980.412469][ T26] audit: type=1400 audit(1552187175.053:25625): avc: denied { map } for pid=4911 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:15 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:06:15 executing program 1: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=@ipv4_deladdr={0x18}, 0x18}}, 0x0) r0 = socket(0x10, 0x80002, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(0xffffffffffffffff, 0xc01064b5, &(0x7f0000000180)={&(0x7f00000000c0)=[0x0], 0x1}) sendmmsg$alg(r0, &(0x7f0000000140), 0x4924985, 0x0) 03:06:15 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 2980.574756][ T26] audit: type=1400 audit(1552187175.063:25626): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2980.689921][ T26] audit: type=1400 audit(1552187175.082:25627): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:15 executing program 3: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000140)='threaded\x00', 0xfe6c) lseek(r0, 0x3f00, 0x4) 03:06:15 executing program 4: socket$inet6_sctp(0xa, 0x5, 0x84) syz_open_dev$sndtimer(&(0x7f0000000580)='/dev/snd/timer\x00', 0x0, 0x2100) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_open(0x0, 0x0, 0x0, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$DRM_IOCTL_UNLOCK(r0, 0x4008642b, &(0x7f0000000400)) listen(r0, 0x8) openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x8000) getpeername(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000080)='./file0\x00', &(0x7f0000000440)='cgroup2\x00', 0x0, 0x0) mkdir(0x0, 0x1a0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000003c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000380), 0x117, 0x5}}, 0x20) rmdir(&(0x7f0000000340)='./file0//ile0\x00') [ 2980.854003][ T26] audit: type=1400 audit(1552187175.122:25628): avc: denied { map } for pid=4911 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2980.956955][ T26] audit: type=1400 audit(1552187175.142:25629): avc: denied { map } for pid=4911 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2981.133056][ T26] audit: type=1400 audit(1552187175.172:25630): avc: denied { map } for pid=4911 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2981.272242][ T26] audit: type=1400 audit(1552187175.241:25631): avc: denied { map } for pid=4911 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2981.403146][ T26] audit: type=1400 audit(1552187175.251:25632): avc: denied { map } for pid=4911 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2981.496149][ T26] audit: type=1400 audit(1552187175.291:25633): avc: denied { map } for pid=4911 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2981.637962][ T26] audit: type=1400 audit(1552187175.291:25634): avc: denied { map } for pid=4911 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:16 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 2982.144408][ C0] net_ratelimit: 26 callbacks suppressed [ 2982.144462][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2982.156365][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2982.224939][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2982.231239][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2982.237783][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2982.244168][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:06:16 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:06:16 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x1, &(0x7f00000000c0)=0xffffffffffffffff, 0x100, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f00003e8000), 0x401, &(0x7f0000336000/0x3000)=nil, 0x2) [ 2982.305087][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2982.310947][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2982.316826][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2982.322586][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:06:17 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:06:17 executing program 4: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000144000), &(0x7f0000343ff8)='./file0\x00', &(0x7f000015d000)='nfs\x00', 0x0, &(0x7f000000a000)) 03:06:18 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(0xffffffffffffffff, 0x4008af23, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) delete_module(&(0x7f0000000a00)=',\x00', 0x0) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f00000003c0)='security.evm\x00', 0x0, 0x0, 0x1) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@local, 0x0, 0xfffffffffffffffd}, 0xfffffffffffffff1) fsetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x7f) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000900)=[{&(0x7f00000001c0)="12", 0x1, 0x800}], 0x410, 0x0) 03:06:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0xc72f, 0x0) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000000)={0x0, 0x2, 0x200000000001f, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "77100b6a1cc076a15ad9f0552d5b12bfc338e5269b12ac2a4ee4202c64122b0a"}}) 03:06:18 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) ioctl$TUNSETVNETLE(r0, 0x800454df, &(0x7f00000000c0)) 03:06:18 executing program 0: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:06:18 executing program 5: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:06:19 executing program 2: io_setup(0x4, &(0x7f0000000040)=0x0) io_submit(r0, 0x1a0, 0xffffffffffffffff) 03:06:19 executing program 3: socketpair(0x1, 0x80003, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000180)='..') 03:06:19 executing program 4: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x11, 0xa, 0x300) getsockname(r0, 0x0, &(0x7f0000000140)) 03:06:19 executing program 1: unshare(0x40400) openat$vnet(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) r0 = socket$alg(0x26, 0x5, 0x0) pipe(0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'crc32\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) perf_event_open(&(0x7f0000000340)={0x0, 0x70, 0x3, 0x4137, 0x356b461a, 0x0, 0x0, 0x0, 0x80800, 0x0, 0x0, 0xc9, 0x9, 0x0, 0x0, 0x0, 0x8, 0x5, 0x1, 0x0, 0xc000000000000000, 0x80000000, 0x4, 0x0, 0x300000000000, 0xfffffffffffff67f, 0xf3f, 0x0, 0x0, 0x80000001, 0x3, 0x1, 0x9, 0x0, 0x0, 0x8, 0x56, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x80, 0x761e}, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8}, 0x0, 0xd, 0xffffffffffffffff, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f0000000040)='9p\x00', 0x0, &(0x7f0000000300)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can, 0x200056d0, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x1a9, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, 0x0) 03:06:19 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)={0x24, 0x32, 0x119, 0x0, 0x0, {0x2}, [@generic="ffd38d9b", @nested={0xc, 0x1, [@typed={0x8, 0x50, @ipv4=@multicast1=0x63000006}]}]}, 0x24}}, 0x0) [ 2985.489425][ T26] kauditd_printk_skb: 140 callbacks suppressed [ 2985.489440][ T26] audit: type=1400 audit(1552187180.083:25775): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2985.618130][ T26] audit: type=1400 audit(1552187180.133:25776): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2985.751334][ T26] audit: type=1400 audit(1552187180.162:25777): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$rds(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, 0x0, 0x0, &(0x7f00000002c0)=[@mask_cswp={0x58, 0x114, 0x2, {{}, 0x0, 0x0}}], 0x58}, 0x0) openat$vicodec1(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/video37\x00', 0x2, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) 03:06:20 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='nv\x00', 0x3) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b, 0xfd6b36d1aa000000}, 0x100) [ 2985.923302][ T26] audit: type=1400 audit(1552187180.172:25778): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2986.018747][ T26] audit: type=1400 audit(1552187180.172:25779): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2986.108172][ T26] audit: type=1400 audit(1552187180.192:25780): avc: denied { map } for pid=6239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:20 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ac20a90d421a53426abb0b422eb1e6e1d3"], 0x11) recvmmsg(r1, &(0x7f00000039c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002880)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) [ 2986.230702][ T26] audit: type=1400 audit(1552187180.202:25781): avc: denied { map } for pid=6239 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2986.329984][ T26] audit: type=1400 audit(1552187180.242:25782): avc: denied { map } for pid=6239 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:21 executing program 4: clone(0x2102009ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x0, @empty, 0x4e22, 0x0, 'ovf\x00'}, 0x2c) [ 2986.424238][ T26] audit: type=1400 audit(1552187180.242:25783): avc: denied { map } for pid=6239 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2986.461123][ T6453] IPVS: set_ctl: invalid protocol: 60 0.0.0.9:20000 [ 2986.562837][ T26] audit: type=1400 audit(1552187180.291:25784): avc: denied { map } for pid=6239 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:21 executing program 5: r0 = socket$pppoe(0x18, 0x1, 0x0) getsockname$packet(r0, 0x0, &(0x7f00000002c0)) [ 2986.869143][ T6439] IPVS: set_ctl: invalid protocol: 60 0.0.0.9:20000 03:06:21 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f0000000900)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_FLAGS={0x8, 0x4}]]}}}]}, 0x38}}, 0x0) [ 2986.965671][ T6573] IPVS: set_ctl: invalid protocol: 0 0.0.0.0:20002 03:06:21 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:21 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:21 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ac20a90d421a53426abb0b422eb1e6e1d3"], 0x11) recvmmsg(r1, &(0x7f00000039c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002880)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) [ 2987.439582][ T6835] netlink: 'syz-executor.0': attribute type 4 has an invalid length. 03:06:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ac20a90d421a53426abb0b422eb1e6e1d3"], 0x11) recvmmsg(r1, &(0x7f00000039c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002880)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 03:06:22 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:22 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ac20a90d421a53426abb0b422eb1e6e1d3"], 0x11) recvmmsg(r1, &(0x7f00000039c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002880)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 03:06:22 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:22 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ac20a90d421a53426abb0b422eb1e6e1d3"], 0x11) recvmmsg(r1, &(0x7f00000039c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002880)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) [ 2988.137249][ T6843] IPVS: set_ctl: invalid protocol: 60 0.0.0.9:20000 03:06:22 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) [ 2988.432893][ C0] net_ratelimit: 27 callbacks suppressed [ 2988.432902][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2988.444377][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:06:23 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) [ 2988.513514][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2988.519298][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2988.525166][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2988.530931][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:06:23 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) [ 2988.594154][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2988.600014][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2988.605890][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2988.611665][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:06:23 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ac20a90d421a53426abb0b422eb1e6e1d3"], 0x11) recvmmsg(r1, &(0x7f00000039c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002880)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 03:06:23 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000002c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000001400)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="ac20a90d421a53426abb0b422eb1e6e1d3"], 0x11) recvmmsg(r1, &(0x7f00000039c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000003880)=[{&(0x7f0000002880)=""/4096, 0x1000}], 0x1}}], 0x2, 0x0, 0x0) 03:06:24 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:24 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:24 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:24 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:24 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) [ 2990.531208][ T26] kauditd_printk_skb: 202 callbacks suppressed [ 2990.531223][ T26] audit: type=1400 audit(1552187185.094:25987): avc: denied { map } for pid=7590 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:25 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:25 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:25 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:25 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) [ 2990.679801][ T26] audit: type=1400 audit(1552187185.133:25988): avc: denied { map } for pid=7590 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2990.767031][ T26] audit: type=1400 audit(1552187185.153:25989): avc: denied { map } for pid=7590 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2990.878506][ T26] audit: type=1400 audit(1552187185.163:25990): avc: denied { map } for pid=7590 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2991.004200][ T26] audit: type=1400 audit(1552187185.233:25991): avc: denied { map } for pid=7590 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2991.128300][ T26] audit: type=1400 audit(1552187185.233:25992): avc: denied { map } for pid=7590 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2991.173286][ T26] audit: type=1400 audit(1552187185.282:25993): avc: denied { map } for pid=7590 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 2991.225521][ T26] audit: type=1400 audit(1552187185.282:25994): avc: denied { map } for pid=7590 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:25 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) [ 2991.305918][ T26] audit: type=1400 audit(1552187185.282:25995): avc: denied { create } for pid=7585 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:06:25 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:26 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) [ 2991.471834][ T26] audit: type=1400 audit(1552187185.292:25996): avc: denied { write } for pid=7585 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:06:26 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:26 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:27 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:27 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:27 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:27 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:27 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:28 executing program 4: r0 = memfd_create(&(0x7f0000000280)='/dev/autofs\x00', 0x0) mmap(&(0x7f0000000000/0xaa2000)=nil, 0xaa2000, 0x0, 0x11, r0, 0x0) rt_sigsuspend(&(0x7f0000000140), 0x8) 03:06:28 executing program 0: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x5) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0xa6ba0) io_setup(0x80, &(0x7f0000000200)=0x0) io_submit(r1, 0x653, &(0x7f0000000540)=[&(0x7f00000000c0)={0x8040000000c0000, 0x12, 0x8, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7, 0xc00}]) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c831, 0xffffffffffffffff, 0x0) write$sndseq(0xffffffffffffffff, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) 03:06:28 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:28 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x100000000805, 0x0) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0xf, &(0x7f0000745ffc), &(0x7f0000b96000)=0x35b) 03:06:28 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) [ 2994.721968][ C0] net_ratelimit: 26 callbacks suppressed [ 2994.721976][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2994.733485][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2994.802620][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2994.808405][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 2994.814260][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 2994.820028][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:06:29 executing program 4: unshare(0x8020000) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) unshare(0x8020400) [ 2994.883185][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2994.888987][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 2994.894896][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 2994.900695][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:06:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000002c0)=@sack_info={0x0, 0x0, 0x4}, 0xc) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffe14) r1 = accept4(r0, &(0x7f0000000b40)=@alg, &(0x7f0000000840)=0x80, 0x0) r2 = socket$inet6_sctp(0xa, 0x8000000000000001, 0x84) sendto$inet6(r2, &(0x7f0000000080)='X', 0x1, 0x0, &(0x7f0000000500)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000bc0)={0x0, 0x800, 0x6a, 0x8, 0x32e, 0x7, 0x7, 0x1, {0x0, @in6={{0xa, 0x4e20, 0x20000, @ipv4={[], [], @loopback}, 0x3f}}, 0x5, 0x100000001, 0x40, 0x4, 0x4cd}}, &(0x7f0000000040)=0xb0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r1, 0x84, 0x70, &(0x7f0000000c80)={0x0, @in={{0x2, 0x4e20, @loopback}}, [0xfffffffffffff6ea, 0x0, 0x9, 0x1f, 0xffffffff, 0x100000000, 0x81, 0xfffffffffffffff9, 0x4, 0x3, 0x6, 0x4, 0x9, 0x7, 0x5]}, &(0x7f0000000480)=0x100) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000004c0)=@assoc_value={r3, 0x7}, 0x2c) shutdown(0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[]}, 0x1, 0x0, 0x0, 0x8084}, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000800)='IPVS\x00') getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000980)={0x75a, 0x208, 0x6, 0x3, 0x0}, &(0x7f00000009c0)=0x10) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000a00)={r4, 0xca}, &(0x7f0000000a40)=0x8) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2008000}, 0xc, &(0x7f0000000880)={&(0x7f0000000a80)=ANY=[@ANYBLOB="00002abd7000ffdbdf25100000000800060000002000"], 0x1}, 0x1, 0x0, 0x0, 0x800}, 0x40084) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000001e00)='veth0_to_bridge\x00') pipe(&(0x7f0000000b00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$alg(r1, &(0x7f0000001c80)=[{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001a40)="cfb498eeb9bb78552e8c05f53f3f98987e9c23be7c5752b2f4d6054b2c0a0cb652672615125eea8ed67fc69cdfc196c68bcf2e0dbc7cbcae257ff5e53efe77df693b49f7b6b54e2a9932e07010d9d3420ceac88e9bc84ee18e0733d7240970482868cd718e304f1a79444ee2bf487c7ed4bf5c5d0783b919a5ea64e65bb7fa3dc760344cabc9fdfde2d1d26de8716508926f9847f3037daa7479addb0cafd265366cb98cbc0a472ddb110d18acb0e06c34f389f5dc43615157f918cdc4132d9fde85c55e8d98d856c6d3b2140ba70a10", 0xd0}], 0x1, &(0x7f0000001b80), 0x0, 0x20000004}], 0x1, 0x8000) setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000140)={{0x3c, @rand_addr=0x9, 0x4e20, 0x4, 'fo\x00', 0x39, 0x3, 0x65}, {@loopback, 0x4e20, 0x2, 0x26d5, 0x1, 0x1f}}, 0x44) write$binfmt_misc(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x34000) sendmsg$alg(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000600)="4eb6b026dc81f5323a3d9e248c1834d4859ea1f19484bbb4571614d1bb87125ae97acb79e64d6c6872b812f028166f91f13f15394e0de482005e56bd88360617aa41a8569a1fc0f0a01585dfceaae3b8d31a5e35768cb5eb5375bfc5ec379a674992c5474db308e01d097d07befa249ac1ee283406b06680ef590d7dca0dea295197b0e8242bd3b5dbb9d92decb6bcf5cf4e0416993a77a6dd34041f5b3e866ac8fec986c1546bd5c7f54a666e4c930674a2ffad3dbd3062d262d53856fa6d8f7807d8", 0xc3}], 0x1, &(0x7f0000000540), 0x0, 0x800}, 0x40000) connect$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000001d00)=""/189, &(0x7f0000001dc0)=0xbd) sendto$inet(r1, &(0x7f0000000740)="a7baef2ab350d9b2505d3dfd87595ed501c4ddf70462c5c5a61cc4798a59d12dd00000ca21b8884a73cf6d254bf0e75e0f983549a6bfb861d98c3031474599435212da3ec4f63b5b0085f35f7c50e2b934a95d2900f64f1715a8333cf68dd412193b285db9a9d38846bc3ea82a9293eb7b0fb03a98f435b5fdc32241553db5cb4e09f25c69f533ac601cb0b629b8d391b9a3b51d684766104ab5b0eae3f0592dbcdaaf9d42482ee18235c2efb86082", 0xaf, 0x80, 0x0, 0x0) ioctl$TCSETAF(r5, 0x5408, &(0x7f0000000940)={0xa43, 0x0, 0xffff, 0x8, 0x0, 0x62, 0x6d, 0x0, 0x7, 0x4}) write$binfmt_misc(r1, &(0x7f0000000380)=ANY=[], 0x0) getpeername(r2, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000280)=0x80) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f00000005c0)={@loopback, r6}, 0x14) bind$pptp(r1, &(0x7f0000000000)={0x18, 0x2, {0x1, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1e) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000001c0)={0x3, 0xa3a8, 0x5, 0xffffffffffffffd4, 0x3ff, 0x7fffffff, 0xfffffffffffffff7, 0x3, 0xffff, 0xf12, 0x101}, 0xb) setsockopt$SO_VM_SOCKETS_BUFFER_MAX_SIZE(r1, 0x28, 0x2, &(0x7f0000000580)=0xffffffff, 0x8) 03:06:29 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000c34000/0x1000)=nil}) madvise(&(0x7f000092d000/0x400000)=nil, 0x400000, 0x10200000008) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f00000019c0)=""/4096, 0x1000}, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) mlock2(&(0x7f0000a19000/0x2000)=nil, 0x2000, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r2, &(0x7f0000000700), 0x1000000000000084) 03:06:29 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000580)={0x26, 'aead\x00', 0x0, 0x0, 'aegis256-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="b7f2288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000000440)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@assoc={0x18, 0x117, 0x4, 0x759a}], 0x18}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$binfmt_script(r1, &(0x7f0000000300)=ANY=[], 0xffffffaa) recvmmsg(r1, &(0x7f0000008a00)=[{{0x0, 0x8000a0, &(0x7f0000000400)=[{&(0x7f0000000000)=""/48, 0x7ffff000}, {&(0x7f00000000c0)=""/120, 0x78}, {&(0x7f0000000300)=""/230, 0xe6}], 0x3, 0x0, 0xffffff16}}], 0x261e1, 0x0, &(0x7f0000008bc0)) 03:06:30 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x17, &(0x7f0000118ffc)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) 03:06:30 executing program 1: r0 = socket$rxrpc(0x21, 0x2, 0x4000000000000a) shutdown(r0, 0x0) 03:06:30 executing program 2: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$cgroup_type(r0, &(0x7f0000000040)='threaded\x00', 0x9) fcntl$setstatus(r0, 0x4, 0x44801) ftruncate(r0, 0x5) truncate(&(0x7f0000000240)='./bus\x00', 0x4a00) r1 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) sendfile(r0, r1, 0x0, 0x8000fffffffe) creat(&(0x7f0000000100)='./bus\x00', 0x0) 03:06:30 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x123) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0x0) stat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@local, @in6=@ipv4={[], [], @empty}}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) fstat(r0, &(0x7f0000000640)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@initdev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getuid() getresgid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) getgroups(0x8, &(0x7f00000009c0)=[0x0, 0x0, 0xee00, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0x0]) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000a00)={{}, {}, [{0x2, 0x1}, {0x2, 0x4}, {0x2, 0x2, r1}, {}, {0x2, 0x3, r2}], {0x4, 0x1}, [{0x8, 0x6, r3}, {0x8, 0x3, r4}], {0x10, 0x1}, {0x20, 0x6}}, 0x5c, 0x2) bpf$OBJ_GET_MAP(0x7, 0x0, 0x4d466cb63f2edb72) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60a5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) [ 2996.061216][ T26] kauditd_printk_skb: 205 callbacks suppressed [ 2996.061231][ T26] audit: type=1400 audit(1552187190.571:26202): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:30 executing program 0: r0 = socket$l2tp(0x18, 0x1, 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) connect$l2tp(r0, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r1, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x3a) getsockopt$packet_buf(r0, 0x111, 0x0, &(0x7f0000000300)=""/162, &(0x7f00000003c0)=0xa2) [ 2996.173356][ T26] audit: type=1400 audit(1552187190.590:26203): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:30 executing program 4: unshare(0x8020000) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) unshare(0x8020400) [ 2996.311828][ T26] audit: type=1400 audit(1552187190.620:26204): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2996.413097][ T26] audit: type=1400 audit(1552187190.640:26205): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2996.546579][ T9953] IPVS: ftp: loaded support on port[0] = 21 [ 2996.560715][ T26] audit: type=1400 audit(1552187190.640:26206): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) accept4(r1, &(0x7f00000009c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4}}}, &(0x7f0000000180)=0x80, 0x80800) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r3}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {0x0, r3}}, 0x18) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000280), &(0x7f00000002c0)=0x8) sendto(r1, &(0x7f00005c8f58), 0x0, 0x0, 0x0, 0x0) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, 0x0, 0x0) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r6 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') sendfile(r5, r6, &(0x7f0000000080), 0x1) [ 2996.738916][ T26] audit: type=1400 audit(1552187190.640:26207): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2996.899451][ T26] audit: type=1400 audit(1552187190.690:26208): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:31 executing program 2: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) bind$nfc_llcp(r0, &(0x7f0000000000)={0x27, 0x3, 0x0, 0x0, 0x0, 0x0, "6cb782e4ad88b89d1fd309169f44a72107130ee55d660510420aaa96759ecbc36eb9bb12b6124793608dd0e7316d1d4f4dbac39877e4ac714b7ecefa8a934a"}, 0x60) [ 2997.054524][ T26] audit: type=1400 audit(1552187190.749:26209): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 2997.229815][ T26] audit: type=1400 audit(1552187190.759:26210): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:31 executing program 3: creat(&(0x7f0000000080)='./file0\x00', 0x0) setrlimit(0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) truncate(&(0x7f00000002c0)='./file0\x00', 0x4) [ 2997.403437][ T26] audit: type=1400 audit(1552187190.769:26211): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:32 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f5, &(0x7f0000000080)={'sit0\x00', @ifru_flags}) 03:06:32 executing program 4: unshare(0x8020000) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) unshare(0x8020400) 03:06:32 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x123) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0x0) stat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@local, @in6=@ipv4={[], [], @empty}}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) fstat(r0, &(0x7f0000000640)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@initdev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getuid() getresgid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) getgroups(0x8, &(0x7f00000009c0)=[0x0, 0x0, 0xee00, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0x0]) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000a00)={{}, {}, [{0x2, 0x1}, {0x2, 0x4}, {0x2, 0x2, r1}, {}, {0x2, 0x3, r2}], {0x4, 0x1}, [{0x8, 0x6, r3}, {0x8, 0x3, r4}], {0x10, 0x1}, {0x20, 0x6}}, 0x5c, 0x2) bpf$OBJ_GET_MAP(0x7, 0x0, 0x4d466cb63f2edb72) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60a5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) 03:06:32 executing program 2: symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)='./file0\x00') unlink(&(0x7f00000002c0)='./file0\x00') 03:06:32 executing program 1: openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = memfd_create(&(0x7f0000000080)='\vem1\x8c\xe4L\x196\x05\xadz\xac\x97`VQ\xa5\x0ek\x87q\xeeQ~\xc1\xf8\xa6\x8d\xce', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="40000000000025000400000005007c00000000000000280000000000"], 0x1c) sendfile(r0, r0, &(0x7f0000001000), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1a5, &(0x7f0000000000)=[{}]}, 0x10) [ 2998.690111][T10469] IPVS: ftp: loaded support on port[0] = 21 03:06:33 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="2ec3"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_DEBUGREGS(r2, 0x4080aea2, &(0x7f0000000180)={[0x0, 0x106000], 0x0, 0x4}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:06:33 executing program 0: openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000001c000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x1, 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) getegid() r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) socket$inet6_udplite(0xa, 0x2, 0x88) fstat(0xffffffffffffffff, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000080)) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000740)) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, 0x0, 0xc) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L+', 0x465a}, 0x28, 0x0) mount(0x0, &(0x7f000000fff8)='./file0\x00', 0x0, 0x7ffbf, 0x0) socketpair(0x2, 0x4, 0x6, &(0x7f0000000080)={0xffffffffffffffff}) getsockname$unix(r3, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) 03:06:33 executing program 4: unshare(0x8020000) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffa000/0x4000)=nil) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x4007, 0x0) unshare(0x8020400) 03:06:34 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x123) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0x0) stat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@local, @in6=@ipv4={[], [], @empty}}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) fstat(r0, &(0x7f0000000640)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@initdev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getuid() getresgid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) getgroups(0x8, &(0x7f00000009c0)=[0x0, 0x0, 0xee00, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0x0]) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000a00)={{}, {}, [{0x2, 0x1}, {0x2, 0x4}, {0x2, 0x2, r1}, {}, {0x2, 0x3, r2}], {0x4, 0x1}, [{0x8, 0x6, r3}, {0x8, 0x3, r4}], {0x10, 0x1}, {0x20, 0x6}}, 0x5c, 0x2) bpf$OBJ_GET_MAP(0x7, 0x0, 0x4d466cb63f2edb72) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60a5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) 03:06:34 executing program 3: perf_event_open(&(0x7f0000b5a000)={0x8, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 03:06:34 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0}, 0x18) 03:06:35 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x20000000000000a, 0x2, 0x0) getsockopt$sock_buf(r1, 0x1, 0x15, &(0x7f0000e530e9)=""/16, &(0x7f0000000000)=0x10) 03:06:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f0000c34000)) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000180)={0x0, 0x0, 0x206, 0x0, 0x80, 0x0, 0x3c1, 0x7}, &(0x7f0000000340)=0x20) write(r0, &(0x7f0000000400)="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", 0x200) sendfile(r0, r1, 0x0, 0x10000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000600)=0x5, 0x4) 03:06:35 executing program 1: prctl$PR_SET_KEEPCAPS(0x8, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lookup_dcookie(0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r1 = open$dir(&(0x7f0000000700)='./file0\x00', 0x6c400, 0x0) syz_open_dev$cec(0x0, 0xffffffffffffffff, 0x2) write(r0, &(0x7f0000000400)="34fd98aa1d0e7adec937a5f331a75f487934f50242a0751944936972896c29a5068c8ecba1aa0a4e2a631b5180e1fbde79f4502dc4c4a1fba9dcd9ed83e639aefa1b87631c33d1a82cb0c0035676ddfeb0fe7984d7519b0f839d497fc9d64ef14d1de22220ff2623df4950134b9fb734a52adad95f131cce3672a9d7d7b400d2c62810b5f20351639330948107bf8d4534a03ac389455c54d8eb4d609b3e858b7213b38eb01f0eeaba3739ae927916e28da6a79a3fd5e32d30ab30bf959d4596e5ffbff6789a650b9e7d248d1ba849012336a4f3ef8fab07a8f5b81bb0bc45b2174538315ca12b7c723b2157562564a8a1f19d28179f8c565448e0e921b8c3e6fc4adaafa8b929ad077f633325b6a6f71a586cabc4883e03e19315f946b277858593a7367e232202fe9ad656c6768a1517da7f0498b48cb078e929fb11db0cc551f754bffc4859dd89a396915cc809b07d448573098409ea21371056f67ef4114ec10547f498d24513fe594308bf022868ad21e85bba811942fdc45161a1a8a7fe00d5c6b05ed7954f631bbd12a5c9a5cfa5965e0595de608b04ebe02b3fcbf3b9f57807a1a7ad8528992e2ec65949da2f4a0478dfd3ae52639c15d8aeaa351da6d393b58c772168fae604d097fef4d6b9360eb169a0b0ee70cdc22435a003e68698f61b3b63b1f51011bc8f4ef944c1de821785f670124a1c6ed18335d63412", 0x200) sendfile(r0, r1, 0x0, 0x10000) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000180)={@loopback, @local}, 0x0) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) open(0x0, 0x141042, 0x0) syz_genetlink_get_family_id$fou(0x0) [ 3000.582457][T10867] IPVS: ftp: loaded support on port[0] = 21 [ 3001.011630][ C0] net_ratelimit: 26 callbacks suppressed [ 3001.011638][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.023260][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.091889][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.098117][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.104155][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.110233][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:06:35 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0}, 0x18) [ 3001.172271][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.178083][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.183927][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3001.189698][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3001.269306][ T26] kauditd_printk_skb: 206 callbacks suppressed [ 3001.269319][ T26] audit: type=1400 audit(1552187195.740:26415): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3001.440179][ T26] audit: type=1800 audit(1552187195.829:26416): pid=10886 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17249 res=0 [ 3001.465505][ T26] audit: type=1400 audit(1552187195.839:26417): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:36 executing program 5: bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x123) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000000040), 0x0) stat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a80)={{{@in6=@local, @in6=@ipv4={[], [], @empty}}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) fstat(r0, &(0x7f0000000640)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000006c0)={{{@in6=@initdev, @in=@local}}, {{@in=@multicast1}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@initdev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) getuid() getresgid(&(0x7f0000000900)=0x0, &(0x7f0000000940), &(0x7f0000000980)) getgroups(0x8, &(0x7f00000009c0)=[0x0, 0x0, 0xee00, 0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0x0]) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000a00)={{}, {}, [{0x2, 0x1}, {0x2, 0x4}, {0x2, 0x2, r1}, {}, {0x2, 0x3, r2}], {0x4, 0x1}, [{0x8, 0x6, r3}, {0x8, 0x3, r4}], {0x10, 0x1}, {0x20, 0x6}}, 0x5c, 0x2) bpf$OBJ_GET_MAP(0x7, 0x0, 0x4d466cb63f2edb72) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x891b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60a5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000300)) openat$qat_adf_ctl(0xffffffffffffff9c, 0x0, 0x0, 0x0) unshare(0x40000000) [ 3001.581275][ T26] audit: type=1400 audit(1552187195.849:26418): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:36 executing program 1: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x101006, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3f1802ad0003ed"], 0x7) 03:06:36 executing program 3: r0 = socket$kcm(0x11, 0x3, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@sco={0x1f, {0x608}}, 0x80, 0x0}, 0x0) sendmsg$kcm(r0, &(0x7f0000001540)={&(0x7f0000000040)=@nfc={0x27, 0x3}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000640)="c143050000004000e9011fe4ac14140cebdf2cd6", 0x14}], 0x1}, 0x0) 03:06:36 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0xc, &(0x7f0000000000)={0x0}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x76, &(0x7f0000000100)={r1}, 0x8) 03:06:36 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/arp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[]}, 0x0) preadv(r0, &(0x7f00000017c0), 0x1000000000000304, 0x4f) [ 3001.887802][ T26] audit: type=1400 audit(1552187195.869:26419): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3002.039023][ T26] audit: type=1804 audit(1552187195.889:26420): pid=10886 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.1" name="/file0/file0/root/syzkaller-testdir420134955/syzkaller.OzXyXp/3804/file0" dev="sda1" ino=17249 res=1 [ 3002.221765][ T26] audit: type=1800 audit(1552187195.889:26421): pid=10886 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.1" name="file0" dev="sda1" ino=17249 res=0 [ 3002.349501][ T26] audit: type=1400 audit(1552187195.899:26422): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3002.381434][T11221] IPVS: ftp: loaded support on port[0] = 21 03:06:36 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0}, 0x18) [ 3002.475662][ T26] audit: type=1400 audit(1552187195.948:26423): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3002.609065][ T26] audit: type=1400 audit(1552187196.008:26424): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:37 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x9}, 0x1c) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc100) write$binfmt_aout(r0, &(0x7f0000000b00)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x20402}}, 0x20) 03:06:37 executing program 1: add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000140)="30580201f10cb8b56c96d27c44d58e94ea51a7dfc59e92e80d9482ca7839173a8f1143a7b4616dd21be3453ecf73039a20f43acbb6376139a9070ae27dd847474d1c59b2697801e6ebd81375ca00000000000082d0d6d6cfeb42", 0x5a, 0xfffffffffffffffd) 03:06:37 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) pipe(0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000001c0)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @local}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r2, 0x40045731, 0x0) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, 0x0, 0x0) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) 03:06:38 executing program 5: socketpair$unix(0x1, 0x8000000000000001, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000240)={0x18, 0x0, {0x1, @broadcast, 'hsr0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f0000005b40), 0x40000000000014d, 0x0) 03:06:38 executing program 2: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x8, 0x3ff, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r1 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0xf, &(0x7f0000000400), 0x8) socketpair$unix(0x1, 0x80000000002, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) sendmsg$kcm(r1, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0xfffffffffffffdcb) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000001c0)={r0, &(0x7f00000000c0), 0x0}, 0x18) [ 3003.741094][T11588] PKCS8: Unsupported PKCS#8 version [ 3003.830484][T11588] PKCS8: Unsupported PKCS#8 version 03:06:38 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000002000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x4000000000014, &(0x7f00000000c0)=0x80400000001, 0x240) connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) sendto$inet(r3, &(0x7f0000000100), 0xffffffffffffff1f, 0x0, 0x0, 0x56c3) setsockopt$EBT_SO_SET_COUNTERS(r3, 0x0, 0x29, 0x0, 0x0) dup3(r1, r2, 0x0) 03:06:38 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 03:06:39 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0xc, 0x0, 0x0) 03:06:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000100)='\xd4\xb7\xe7\v%Z\\\xa3\xfa{\x13\x81vm', 0x3) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x1040800) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x100000001) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @empty}, 0x10) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x90000) prctl$PR_SET_TIMERSLACK(0x1d, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000580)=ANY=[@ANYBLOB="010016004f23000000000000000000000000000000000000e4fba3451a310fae5bd155de50112e928d166d08e9d680287f012f7839d132493e36569e951355501a67ce6947ad869c9dc91da1f732d5a7634eb6bc48e1b7dbab5e7f3e2ac34ad984c9620bbee54eb41b3b4be6cdb7078f8bc864c597f9409be7de5dc5b06f3ffb1df2b1ea32113bbbfdd31dc55f5f78582a"], 0x91}}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev}, &(0x7f0000000200)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x89a1, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x600, 0x3ef, 0x0, 0x3f00000000000000, 0x100000000000000, 0x0, 0x1103, 0x0, 0x0, 0x0, 0x0, 0x6]}}) write$9p(0xffffffffffffffff, &(0x7f0000000680)="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", 0xec5) r2 = getpid() ptrace$getenv(0x4201, r2, 0x8, &(0x7f0000000180)) ioctl$sock_inet6_SIOCADDRT(r1, 0x89a0, &(0x7f0000000100)={@local={0xfe, 0x80, [0x0, 0xfeff0000]}, @empty, @loopback}) ioctl$ASHMEM_PURGE_ALL_CACHES(r0, 0x770a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 03:06:39 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_execute_func(&(0x7f0000000140)="cd8075fcb0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b0b5d90000797c2a0f0fcdc4e3a95fd965eae23c3b4d4d408064797f41dfdf400f01efe5e59d7d2f2f1c0a1a63460fc4c161fccddfde9f") syz_execute_func(&(0x7f0000000140)="cd80c20000b0b06969ef69dc00d9c4017d50ee8adcd0d01192000880410fd1b02db5d90000007cc4c4e3a95fd965ea262e410f0ff5bb408064797f41dfdf400e01efc4a1fd28d29d7d2f67450f483b1c0a1a63460fc4c161fc4d96040476789f") 03:06:39 executing program 1: syz_open_dev$mouse(&(0x7f00000003c0)='/dev/input/mouse#\x00', 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) pipe(&(0x7f0000000880)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000500)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) 03:06:39 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000500)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f00000007c0)=0x1) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x79}]}, 0xfdef) 03:06:39 executing program 4: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x800000000000000) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x608002, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0), 0x0) mq_open(&(0x7f00000000c0)='skcipher\x00', 0x3, 0x0, &(0x7f0000000100)={0xd92b, 0x0, 0x7, 0x0, 0x73, 0x0, 0x0, 0x7}) 03:06:39 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) 03:06:40 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f0000008880)=[{{0x0, 0x0, &(0x7f0000000780)}}], 0x1, 0x0, 0x0) syz_open_dev$dspn(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x13, 0x5d}}, &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0x487, &(0x7f000000cf3d)=""/195}, 0x26) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000180)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="263abd030e98ff4dc870bd6688a8", 0x0, 0x4af}, 0x28) 03:06:40 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)={0x1, 0x1}) 03:06:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x545d, 0x0) [ 3006.353004][ T26] kauditd_printk_skb: 199 callbacks suppressed [ 3006.353018][ T26] audit: type=1400 audit(1552187200.790:26624): avc: denied { search } for pid=12231 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3006.533143][ T26] audit: type=1400 audit(1552187200.810:26625): avc: denied { search } for pid=12231 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:41 executing program 3: mkdir(&(0x7f0000000bc0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x19f}], 0x1}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x48a}], 0x1}, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, &(0x7f0000000480)) 03:06:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) [ 3006.689342][ T26] audit: type=1400 audit(1552187200.830:26626): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:41 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)={0x1, 0x1}) [ 3006.870940][ T26] audit: type=1400 audit(1552187200.840:26627): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3007.044479][ T26] audit: type=1400 audit(1552187200.860:26628): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:41 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7b, 0x0, [0x3a, 0x1]}) [ 3007.201519][ T26] audit: type=1400 audit(1552187200.880:26629): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3007.300489][ C0] net_ratelimit: 26 callbacks suppressed [ 3007.300515][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.312551][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3007.380663][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.386447][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3007.392305][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.398079][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3007.444980][ T26] audit: type=1400 audit(1552187200.889:26630): avc: denied { map } for pid=12429 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3007.468347][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.468391][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3007.468493][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3007.468532][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:06:42 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000d65000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={0x14, 0x4000000000003, 0x1, 0xffffffffffffffff}, 0x14}}, 0x0) 03:06:42 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)={0x1, 0x1}) 03:06:42 executing program 4: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x800000000000000) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x608002, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0), 0x0) mq_open(&(0x7f00000000c0)='skcipher\x00', 0x3, 0x0, &(0x7f0000000100)={0xd92b, 0x0, 0x7, 0x0, 0x73, 0x0, 0x0, 0x7}) [ 3007.819624][ T26] audit: type=1400 audit(1552187200.919:26632): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3007.935451][ T26] audit: type=1400 audit(1552187200.919:26633): avc: denied { map } for pid=12429 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:42 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000040)={0xd}) [ 3008.075095][ T26] audit: type=1400 audit(1552187200.939:26634): avc: denied { map } for pid=12429 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3008.383809][T12621] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&çE‚Ñ*"4ü€HÁû•Ö‰aÀtx[ž¾ØýžD‰fC šméÚ¥”Ðl0¢”Ÿ±Ù!í‹5«#JŒäèX~= [†ßt6nâ”"IúœåØ[r•‘ßÌx§!Œ y'¬§ê%"&²Ï„ px•ˆrÙX Ä2oëS¥lNi)B;á‘[D†v[_–uç©'0ýedLFÉV‰w̪Ó¾F4¹kùµÏÕ'É]Ò Œ¥*DQ [ 3008.383809][T12621] l&It¸?/’GjJÍ–…ãÖxQÇÕcWŽëZØèí:ºHµÍœgÖLÎúMÍŠÙ—ËtL¡ŠÖåg–4„¿0\»ï4ìã±nZOLÉ2œ7ûìKùp úž–‰êæÆ fZU& 03:06:43 executing program 1: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1, 0x1) ioctl$int_in(r0, 0x8000008010500c, &(0x7f0000000080)) 03:06:43 executing program 0: socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x4788}}}}}, &(0x7f0000000040)={0x1, 0x1}) 03:06:43 executing program 2: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x101006, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, 0x0) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3f1802ad0003ed"], 0x7) 03:06:43 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:06:44 executing program 3: mkdir(&(0x7f0000000bc0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x19f}], 0x1}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x48a}], 0x1}, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, &(0x7f0000000480)) 03:06:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0acc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x1000, &(0x7f0000017000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r2, r3, &(0x7f0000017000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) 03:06:44 executing program 4: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x800000000000000) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x608002, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0), 0x0) mq_open(&(0x7f00000000c0)='skcipher\x00', 0x3, 0x0, &(0x7f0000000100)={0xd92b, 0x0, 0x7, 0x0, 0x73, 0x0, 0x0, 0x7}) 03:06:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x803, 0x0) write(r1, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000d9bffc), 0xfff9) sendto(r1, &(0x7f00000005c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) getsockopt$sock_int(r1, 0x1, 0x4, 0x0, &(0x7f0000000040)=0xba) 03:06:44 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f00000004c0)=[@textreal={0x8, &(0x7f0000000240)="640fbe0af0f75100ba420066ed360faa66b9800000c00f326635000800000f308221990fc71e27000f216d260f2134baf80c66b82735ea8166efbafc0cb06cee", 0x40}], 0x1, 0x24, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000000)={0x1000000000010004, 0x0, 0x0, 0x2000, &(0x7f0000017000/0x2000)=nil}) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x84000) ioctl$SG_GET_RESERVED_SIZE(r3, 0x2272, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) mremap(&(0x7f000001b000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000022000/0x4000)=nil) 03:06:45 executing program 5: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000000040)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, &(0x7f0000000180)={0x77359400, 0x4}, &(0x7f0000000140), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000fd7ff0)={0x77359400}, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f000000d000)={0x0, 0x7f}, &(0x7f0000048000), 0x0) 03:06:45 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x10, 0x4, 0x4, 0x3}, 0x2c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x0, 0x0}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) [ 3011.402487][ T26] kauditd_printk_skb: 357 callbacks suppressed [ 3011.402512][ T26] audit: type=1400 audit(1552187205.801:26965): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3011.616167][ T26] audit: type=1326 audit(1552187205.781:26964): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13216 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457f29 code=0x50000 [ 3011.829781][ T26] audit: type=1326 audit(1552187205.831:26966): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 pid=13216 comm="syz-executor.4" exe="/root/syz-executor.4" sig=0 arch=c000003e syscall=202 compat=0 ip=0x457f29 code=0x50000 03:06:46 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./bus\x00', 0x1ff, 0x0) [ 3012.047965][ T26] audit: type=1400 audit(1552187205.850:26967): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f00000008c0)="130000001000ffdde200f49ff60f050000230a009d000000119dc53022e5f9ec364f0000c0ff030000001c24e175cc463437101101bd81dc3181ddd83f8d3d1f2c53e45fca5ab94018975d7db75411543e1226408e88cac1f2cbefbb693d8a0c8efc28ceb4ec3ff429592e5de7e4f28bca763acd06f40ad03226af55e3129849ae3c726cf46a629bf91efdb19a5faccffe8090d92237be9951be4bd7c2a1c1a2b5b2684ade4025722c962d916c000000000000003400000000000000d5ba641663ac6847d35b8779c6903efd7800e86ccc2b5bbc156c2a1976a0f57350aeb0775fa06f769670fe98", 0xe8) [ 3012.048434][T13348] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&çE‚Ñ*"4ü€HÁû•Ö‰aÀtx[ž¾ØýžD‰fC šméÚ¥”Ðl0¢”Ÿ±Ù!í‹5«#JŒäèX~= [†ßt6nâ”"IúœåØ[r•‘ßÌx§!Œ y'¬§ê%"&²Ï„ px•ˆrÙX Ä2oëS¥lNi)B;á‘[D†v[_–uç©'0ýedLFÉV‰w̪Ó¾F4¹kùµÏÕ'É]Ò Œ¥*DQ [ 3012.048434][T13348] l&It¸?/’GjJÍ–…ãÖxQÇÕcWŽëZØèí:ºHµÍœgÖLÎúMÍŠÙ—ËtL¡ŠÖåg–4„¿0\»ï4ìã±nZOLÉ2œ7ûìKùp úž–‰êæÆ fZU& 03:06:46 executing program 5: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=0']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, &(0x7f00000001c0)) [ 3012.198286][ T26] audit: type=1400 audit(1552187205.850:26968): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:46 executing program 4: syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0xfffffffffffffffc, 0x800000000000000) rseq(&(0x7f0000000440), 0x20, 0x0, 0x0) seccomp(0x1, 0x2, &(0x7f0000007ff0)={0x1, &(0x7f0000004fe8)=[{0x6, 0x0, 0x0, 0x50000}]}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(0xffffffffffffffff, 0x5386, 0x0) openat$nullb(0xffffffffffffff9c, 0x0, 0x608002, 0x0) bind$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_G_SELECTION(0xffffffffffffffff, 0xc040565e, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f00000001c0), 0x0) mq_open(&(0x7f00000000c0)='skcipher\x00', 0x3, 0x0, &(0x7f0000000100)={0xd92b, 0x0, 0x7, 0x0, 0x73, 0x0, 0x0, 0x7}) [ 3012.390435][T13553] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3012.410339][T23864] audit: audit_backlog=66 > audit_backlog_limit=64 [ 3012.416899][T23864] audit: audit_lost=73 audit_rate_limit=0 audit_backlog_limit=64 03:06:46 executing program 3: mkdir(&(0x7f0000000bc0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x19f}], 0x1}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x48a}], 0x1}, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, &(0x7f0000000480)) [ 3012.435908][T13553] audit: audit_lost=74 audit_rate_limit=0 audit_backlog_limit=64 [ 3012.438333][T24291] audit: audit_backlog=66 > audit_backlog_limit=64 03:06:47 executing program 2: r0 = socket(0x2, 0x3, 0xff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) sendfile(r1, r1, 0x0, 0xbe5) write$UHID_INPUT(r1, &(0x7f00000000c0)={0x8, "8e992a855aef50de3b36275159d4e99e6d92832733c6fbee684526263b1f00bd48865a59195dc13f9e6e4e1180fe6925ecabe1a5a42341a3b94f299ac7a8360401b9119e8e6b706af75f72b3941a9dd3c85761ee80dac9a5e361ed273737dd25415c5e36a48b105824e3ef4a14db3e16eeaa747b86d37a4bd7e3b9ff049c6dbd0585843fb8bd03239e8c691f166df1c815ec972af0545e18a0107031c965010ff28ddce1c7d8272b6aa39ac4504981f059769e3f9d230effb2a7639be749c060a4aad53d125ffd1d9e72f517892746f3b036843cf4ef7a903b10cf7ee84209396fd9209ade090078e856d225ae322cf13dfec49f40241bb00a6fbda4b87c4722fcd69619b201a04cee3c97e9d11bb182d9826ea60a68dbe34c2ce35a4dd8cfb5966a6681ab74392e77cdf0e406ca7f85d383a80540d2386bc43504b29c4b56cb3ddc4dace30d7ef745a14ff03cab0d6277b387555021dbe929144c8acd326f4588a5c7eccbb0c5ef8737c575d008e97ff57b7bbfa96ad2aefdbaea197e09140e4cb48d4ac448ab5ef67550f4448fb2051e0f4c0d465ebec78fc12ee25153366da54a25017a6b3ec7f2b8629504070b9c007a90f5d07d98ce3adfb209a31109bc98abb114cf94394ffa0c735942f54481426e94e3900437e28bd482fcaf77b6b95301855f90b5165b26b713cf617ec5a71e621ce792ff807156fbf53ea33f727f93476c06bc6564770dcf64b24654eaa38e2c4646f83b4ee419f3a457e9e9ed29e3baab4806e5f1e9fd0bc74d64fcc0bef9328f5ac148a07577b606415506a093718d632529b29c738c05d741b9f630f5f7f20e41eada386e68423c48d69cbb9bfca139e145a100161f5066a65eb6d1ddd80ccdfbb3c69f2e34ad5d0195d0c5320550d4941d6aaa701d4bcc6a17e72f01ba2e59326e05ec64ad1f0f179c7b94b3be30adda78b6c8b5270174c2fcef27fec50739a5db44102128e0df99cce12d4df95eb03480e1d6bcb12a29c7e4e228f8660d2737e849df1133b40c77f5afb24907c6ae4da09327d56ff5f39869a03fcba6eb2c76b3eeceb76c96e9dd34628db735fa43e3c0b92aeb15f1bf4687242fcbf53287092aca65171f706b4cfb06b48f4d646958a5f659ed570e0b2d7e30dd9d6068f7a03781752cfacc8ab0906d36309719cd6e63c2c088cc4adbb57482f7dd91362da4494463a6e24aaa8fbe00192dcc8e0cc0428b2726abff2b0d63881f941d6a48434a20854d4302abb47f2d6c67483e8e786fecf517fb259264cb145598b6ad56146755d56fa521fe69b56eb26cdd08da3d3fecfc3106fd0f4cc3aadd0b674685fefc549ff1ca738c41f56c35b0a48df40456a1339858ee56afa1b66123c8741e599f5390d3779c44a7d0f8f074acf357eb8094a7d68783a85007a7b4d05954d3f4ab5f5ab6969dd745eca00de516cbeca7e1f1b6c06fce2cede53fff8d32c6f01461588865cbc7fa635891e0c777a646569e631a602392c9ad413f88f7fde147f95cddd8e5c1d90bbaa534ea309fe6c788564edd9be30e9beb2e55155492b4015f6de4331784c2887ff4e6018a25fe3cea09aebc707547fcf0e3a8a3a75a12d405fc9170411a505715f650b2034fc9b34e283b0a82580b500fb13fec659ad7994fc010626dcd0266e86a6ca8c7261ad37fc703c862747d62b760e664a95eeb49c518775b65744245e5e97e46d9ada027cba0fd6bbf42301aebf8c6490dbc7188a7cbf6cf6846b6efeb8067e967749c093bc44ac3ad1e44065c8f00f9aba30626c6f16cf855f5979b45cb9b5b7300062e4caa741482b80b60d434139fd3ec4f71c8ebf113dea14e68f8cf138cf9ece3fb71f53715398ff58fde45818947d59fde2f9f7e754d14300abf5df4898fbdab2fe88d84b247dab572755ae400901bcb5c7a7724064932cdebd04ebc0d4a4fd697c11898d0480843080fa323b1f7bcac0866b56fc6dbe1e194f7f79837f10cc36b7afb567ec74f267ed546d3ee126b4769ebcf9e67054fe2bbe07de76f847e6746fc1181992eb7a9b7da6a624a3afd54be1dc42aa9abac1e0c20b8791331386aac8b503f9e0665a04fa86d09136343f5e372ec254aafc1eee49918642e914c4ae9f794c10dca8dd81abb00d6009f15cab0709199b969ce1dadbcca416cd7b37d4465b2ee9eff5304e35eefa9a6c2ba86052ba14a66def6444d564069c34360e154c7691f8a6bcdf7fe0aaf3037546d0b3c9ac4860b8dd6d39d60d735f6363b2c8a5ec34754fcd1bc80116612c5e2e391a0db47e73a49e5b1fa5f1568ca165c08723d6c2de575185ebad1104e4a3f1040eaf81aa0fd9c1003a661a184eb299e0303a6cacfd0e96eab8fd6377f8f35d254bdc757d33b40a15be0230a30048df833cfc03aac3a4b13ebceea35923c023880c6b3e145991df04028abc06ced70383a3ec8cb809b1ef2a80ff0c95c216d430d6fa91dc180b857bcb546f9200d632df7430cadf7a8a2ba12fe96d904cac969e59aa908f62edbccf4c08527a89e27b9e84a777359fc2de631d40ea22febcbc3fd425cdc0e53124198eacddd35825362e152a5280c09a90f102f461d8a7780b4e88820bd3987d022bce37f719897abf1774601e488332ad1dc2f2c60d1e1993d61f37bcbbc9c49936c024cacc286c5e912de4a4f5c6af35545862e72b43bb665cdd05e2f7f0c86c4815789e59d4737220bb1e0302fda8d919fe2ebe22accc0c87c33a224401de41a786aeccac10f4de1023c4a4c0a1a15f513d03b080ac1205954ae46e440f66c18ffbb1ca743dd8cd8cf42df4bb28ea160f950cccf7264a91d40a1f337915b7c0086a00789004d2e31af876aff9b88d0ded691fc1ae73279aa97e213aa15fcf78576f27b7d49884931afe2ac2ba125e58484cf2be872e29c7b78050ea21c04a84cf3528d87b66124356f89939c7a15b8b2904158d6f099c64946543eca73bbcb97f4aa48aa4b1cc3cb9de01de1cb0415a83d78e3567138ac76a1e7d89a9df102477f99fa6ecca8941681c6a5696abbef4e77cbf1f55384404cee3d7f94b53b6037a29bc69836f79b97ba943a7db9ebd97ec38b06ba1cf2b4425fa676663bbcb1602effba21d86007ed52dbf7ea793ceea19b8ad1ff8fa3f2de81dd84328654ffc7ef72e5a4d2201d28cb921a73c9b50fcad3d0cb6af183edccc3c85c80494e9ea5075af150bb9b02ad20e76bc2077bca288f5cd88618362082ef77df3e3adc2a2bbff99c2c1e752aac79571dc0e4610fe25361280dba4bc1c9f862c3f1c4bf1526ac2f8f98d5e21bd6b940d18e3d3bf7515be31be9a924a531a518a6551d336c7468d73a78e453c6bd8c520136721676dd958a834d751585a96647e8130fa6d00a69c2a08bf499f295c0195a3196cbd7341c8d3c2a5a976b9259dea3b3bd7cfd883845a82678a7e7229e93668b9d5e4a7167e8b95110b7ac8320da527305890d966143fd9f52c7e32b89608bfe9a658d8d905b5f8b02719e68e1cea7b387c2d05ba3e7379385558c04bdcc2ce09d79a9454d1ee599df8986eaf929c19a80507a90215db669b128a6f97ea4f88b5bd6e03e87f23d1b1c7c647fe0c30babe0ec9542937c279996661722bf3ac3ea5850d13efcfb02a6ed3ece7f5ac03b5db751790f9e70086cea4624900bd7ae767f66200f7678ff02fc7eff5b77ad7863eaba3b7ef1626d1c37d75554b9101742ddee12420664f122aa5dfd5da0a0fd17326a9becd01008ccd6be46348b12738a39f52a54d994aa126e91146a9acfbb77363f18ca86a915f28b7ecddb1bed7a1dc8752f8ec9901c98c03ef02d76dd5eda4768f63e1baf93046dd48349633dbb1d771b324b0e44996fd7fe3d851361fb28ef9cad0c278bc92c3497881f2f8638116f7611482695dd8a18c6a27b423c60e21bfdb14ce114b71c917b21417f33a77b8659cf3d1c2817d25b666b05a0f40b33480c370e3d4114157c246ab65bd7ad85e8ce8e31cc657bb63c884598ff436d4a3f5817c1b0e19fd4c70b67991275340513c61c4de06adafaefd813e8586858f7c41e0b276967c9ba9efe2c2042e37080dfb4e3cbdacae98552575a45cb994e521e071ad23ca2911097d50977b4bd60e278424cef4df91ec21897873e974f0437494f1bd784692d80f58967ceaa6c5ef9b32e9074aea293be1630af73f4c142985135e99865040800ec86fb7d7f7813d1f0bd468bc99efd0819f27de9914c51cbc348259b0daed08e08c993fe9f6e9392f4c7d0c99a63b524c4a029e2fdd23af58e6cff498ecfbb5532ffe8410fa9c8fe41656e19359a65c7d43dff421cd1a6ac0594ef318019c8699a3e92f4662bf3a599d59ac86a9dcd17871a8d4b85028b3448b929321803f9010cc98d02642c240ac4e89e65df967b7f5e4ef560c3d40fb4568e573daa96d38c2295d2918c51f4b3cda45c931aa683e637027e0ce34e8e506c75f77647016380ec697a197f8e83a7a3f04516cd3e497f4f65556437f01b1733f251ea5f566509083d28931646c5839e695e9150846b29fff5e5df7b23cf48b4eeac82d61bbecb966c8468830c0320866377f0fc5726b35de9e49c1e7c8f463b8caa169bd16bd3c7602708fb05d68ac0ee9dfe30b8c03e1f1c342ecd5be5cad10c925773af5541a2917b44cf78f0036bbefac9daaa677b93232c5e1e6d830f6737a48ac8c89fd39b5787637fd7ef1ec737dffe751a889f68d8c4a5556254e34246e2c15334ca01ae103abcd2be14fbab590250c7f68e11c7ae44d03ec50f3f0775357f7a97b30cfb7f8f75936a4f950d25cb7366c1682ef28d9b728697853cc004b39ad52ebc000aa1b9d9e491d3771ffba6c4dbc3b8a00831027a5decd8c200bbb2f6f76d13108ab6fe67d96bf52fde4f3f32553a5054e11c2580fc6e3d8aa1a991c7f91a3e0a282b1528c3eca3affd97ba874cc0a11022f0b14f01d25e2228a035b4928e67bd896761985a7e5f0788887bf710ba93846a4f9ebf57ff3c20dadcc622675d38b6c887eadf9b2b5498f8618040f9076e6c7151046f0612104139555660cde2aa53028fa0acd7323f74ccaec26e28c6d1b9c5184019afd1a3b366edd2ecac46a89069fcd66313e8f448aa13107d2409588ea1d8f2388f0cb3a267aaa2901f834bc110b0f0537a06c450a5768e6a1ae05e874afac1ab463a175529fd564c8c2e2b026d8581029e7a3d1e125acc1d38a245441a98ec3fdc6fc51b30482dbec7d5c4c569963367a781f69cab9e20928d73ec715f8017c23ce91f4bbd358de9c828c672e9b4aeb1d2f0220b2ffe3dab6e7c00760ca638f976513c1024f40d0188af408d7a9d0a30de857a01136eb603f2db0db722decb9889759692f9da73db4d75c39cc192e3b4051d83da8a386d16a6d38638abad6766026b740887a4e4575bb8d204d8f6ba887b0a3296a5b14553b7f396083de62bbe2966787b0076c55e3f94999919ed213b1e865c64a103eb02a56d85c8ad9e2aa4bef9b2c5553c6a832c7a4afa1f1d1cc1b07f101e6062737c3a87ffdee43d0f0ec1fe162c884a005733b9b3faded15d41833658df8c08fccc6715ce93db312ad764f25d7f65f51c205202a4f4545554befdf06a71743299f5b456e68c74ae67722db6c0fe12e01e9b29407fe8f0eff5ab2c8c7e2d7189a9f4ab3156b90084273549572ce210e39812da2b7c0b17c57f1c8a4ac95b0bcab8e9c4414f49be7d18671db6487bbcc565ae7005ec976e2146a5047fa575e2390cc8159dcaa4b8e613df2243a725841b006730e5ddae63c0d5", 0x1000}, 0x1006) sendfile(r0, r1, 0x0, 0x400008bca) 03:06:47 executing program 1: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0x0, 0x0}) sendmmsg(r0, &(0x7f0000008600)=[{{0x0, 0x0, &(0x7f0000003140)}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 3013.589861][ C0] net_ratelimit: 26 callbacks suppressed [ 3013.589905][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3013.602293][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3013.669735][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3013.676004][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3013.681891][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3013.687656][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3013.750763][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3013.757125][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3013.763855][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3013.770034][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:06:48 executing program 5: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=0']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, &(0x7f00000001c0)) 03:06:48 executing program 0: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=0']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, &(0x7f00000001c0)) 03:06:48 executing program 2: r0 = socket(0x2, 0x3, 0xff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) sendfile(r1, r1, 0x0, 0xbe5) write$UHID_INPUT(r1, &(0x7f00000000c0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r1, 0x0, 0x400008bca) 03:06:48 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740002047e0002000270f7f8", 0x16}], 0x0, 0x0) umount2(0x0, 0x0) 03:06:48 executing program 5: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=0']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, &(0x7f00000001c0)) 03:06:48 executing program 0: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=0']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, &(0x7f00000001c0)) 03:06:48 executing program 1: syz_emit_ethernet(0x82, &(0x7f0000000140)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '\"[s', 0x4c, 0x88, 0x0, @dev, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x8, 0x3, [], "fd5597af963c077d"}}}}}}}, 0x0) [ 3014.757200][T14049] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&çE‚Ñ*"4ü€HÁû•Ö‰aÀtx[ž¾ØýžD‰fC šméÚ¥”Ðl0¢”Ÿ±Ù!í‹5«#JŒäèX~= [†ßt6nâ”"IúœåØ[r•‘ßÌx§!Œ y'¬§ê%"&²Ï„ px•ˆrÙX Ä2oëS¥lNi)B;á‘[D†v[_–uç©'0ýedLFÉV‰w̪Ó¾F4¹kùµÏÕ'É]Ò Œ¥*DQ [ 3014.757200][T14049] l&It¸?/’GjJÍ–…ãÖxQÇÕcWŽëZØèí:ºHµÍœgÖLÎúMÍŠÙ—ËtL¡ŠÖåg–4„¿0\»ï4ìã±nZOLÉ2œ7ûìKùp úž–‰êæÆ fZU& 03:06:49 executing program 3: mkdir(&(0x7f0000000bc0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000002880)=[{&(0x7f0000000680)="7027244a93b90a1de7bfc1ed0e95876df0d074347d046d60f44959b7fdfcd5e61a703636c5ebe0773ad10ea9bc3018566824463898e81aad5629e71e5d30f2b5b68d8a497d8f19d491f51d8585f2e0eeed54220fbe69d7d01491f2edd5c5cfc90c22d5e048fcdab7e8e413dc479c7bf4b4fc86e17013aca658aade625505ebc392cac63082c42cbcd02827e2a0ad26f559ef4c1cfb60a8ee9c9b5412935bc290d54f34c4d04e06839006ac9ce34c1738b9951ffae2fa452b08d3d7e1803a1c868489e5a63f710937692c7ee58f334cccd05805c5cef9103dcd01e4ffd34e389b26498318c74651b5b86b3af64e16545f85235d33e171b4112479ede24d83d1f161b933d261eefca2c28faa27b7911f1bb07e0b836aa5253aa1a8cef07170f3f750fd807f3dcf176f31d902f17f688490364d596f2623499e2221a9f81a7a9ddd3062f7ca1055ea8b555e8b1a9272e977ce051d77cbf9c89625b1981becba833adaedc1328b3c2a8071078ec5c04467e9cca168fa01937e7f568fae5cdff21bba6fb056434b04d9c3ce5e59d84983e8a7dab117c376d3e7de357d456fc172f2", 0x19f}], 0x1}, 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x48a}], 0x1}, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x100021, &(0x7f0000000480)) [ 3015.319974][T14098] FAT-fs (loop4): Directory bread(block 126) failed [ 3015.344090][T14098] FAT-fs (loop4): Directory bread(block 127) failed [ 3015.351262][T14098] FAT-fs (loop4): Directory bread(block 128) failed 03:06:49 executing program 1: syz_emit_ethernet(0x82, &(0x7f0000000140)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '\"[s', 0x4c, 0x88, 0x0, @dev, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x8, 0x3, [], "fd5597af963c077d"}}}}}}}, 0x0) 03:06:49 executing program 5: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=0']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, &(0x7f00000001c0)) [ 3015.396658][T14098] FAT-fs (loop4): Directory bread(block 129) failed 03:06:49 executing program 2: r0 = socket(0x2, 0x3, 0xff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) sendfile(r1, r1, 0x0, 0xbe5) write$UHID_INPUT(r1, &(0x7f00000000c0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r1, 0x0, 0x400008bca) [ 3015.447287][T14098] FAT-fs (loop4): Directory bread(block 130) failed [ 3015.498304][T14098] FAT-fs (loop4): Directory bread(block 131) failed 03:06:49 executing program 0: mount$bpf(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='mode=0']) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='debugfs\x00', 0x0, &(0x7f00000001c0)) [ 3015.542062][T14098] FAT-fs (loop4): Directory bread(block 132) failed [ 3015.607320][T14098] FAT-fs (loop4): Directory bread(block 133) failed [ 3015.650405][T14098] FAT-fs (loop4): Directory bread(block 134) failed [ 3015.675439][T14098] FAT-fs (loop4): Directory bread(block 135) failed 03:06:50 executing program 1: syz_emit_ethernet(0x82, &(0x7f0000000140)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '\"[s', 0x4c, 0x88, 0x0, @dev, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x8, 0x3, [], "fd5597af963c077d"}}}}}}}, 0x0) 03:06:50 executing program 4: syz_emit_ethernet(0xffb6, &(0x7f000000a000)={@broadcast=[0xff, 0xe0], @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0xfec3, 0x0, 0x0, 0x0, 0xffffff89, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}, @multicast1}, @udp={0x0, 0x0, 0xffffca88}}}}}, 0x0) 03:06:50 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x10000002, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='se\x00\x00\x00\x00ty=SMACK64\x00', &(0x7f0000000080)='*\')keyring\x00', 0xb, 0x1) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000000)=0xfffffffffffffff9) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = dup2(r1, r1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000380)='nv\x00', 0x3) nanosleep(0x0, 0x0) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0x4008ae89, 0x0) ioctl$FICLONERANGE(0xffffffffffffffff, 0x4020940d, 0x0) recvfrom$inet6(r3, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x100, &(0x7f0000001880), 0x1c) signalfd(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$sndpcmc(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, 0x0, 0x0) ioctl$KVM_IOEVENTFD(0xffffffffffffffff, 0x4040ae79, 0x0) getsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) lsetxattr$trusted_overlay_upper(0x0, 0x0, 0x0, 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) sendto$inet6(r3, &(0x7f0000000500)="2ff6", 0x2, 0x4000000, 0x0, 0x0) r4 = accept4(r1, 0x0, 0x0, 0x0) sendto$inet6(r4, &(0x7f0000000340), 0xd1e67d33, 0x40000, 0x0, 0xffffffb5) [ 3016.456361][ T26] kauditd_printk_skb: 291 callbacks suppressed [ 3016.456377][ T26] audit: type=1400 audit(1552187210.811:27199): avc: denied { map } for pid=14211 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:50 executing program 2: r0 = socket(0x2, 0x3, 0xff) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x32) r1 = open(&(0x7f0000074000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x8007ffc) sendfile(r1, r1, 0x0, 0xbe5) write$UHID_INPUT(r1, &(0x7f00000000c0)={0x8, "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", 0x1000}, 0x1006) sendfile(r0, r1, 0x0, 0x400008bca) 03:06:51 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$KVM_RUN(r1, 0xae80, 0x0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x4000000) setsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f00000002c0)=@assoc_value, 0x8) ioctl$sock_SIOCDELDLCI(0xffffffffffffffff, 0x8981, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) syz_mount_image$minix(&(0x7f00000000c0)='minix\x00', &(0x7f0000000080)='./file0\x00', 0x6c000000, 0x1, &(0x7f0000000240)=[{&(0x7f0000000100)="600084e002000a00900cda40ff1ad5c98f13", 0x12, 0x400}], 0x810440, 0x0) [ 3016.606220][ T26] audit: type=1400 audit(1552187210.871:27200): avc: denied { map } for pid=14211 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3016.736280][ T26] audit: type=1400 audit(1552187210.901:27201): avc: denied { map } for pid=14211 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:06:51 executing program 1: syz_emit_ethernet(0x82, &(0x7f0000000140)={@link_local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, '\"[s', 0x4c, 0x88, 0x0, @dev, @local, {[], @gre={{0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x880b, 0x8, 0x3, [], "fd5597af963c077d"}}}}}}}, 0x0) [ 3016.856931][ T26] audit: type=1400 audit(1552187210.901:27202): avc: denied { map } for pid=14211 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3017.004260][ T26] audit: type=1400 audit(1552187210.990:27203): avc: denied { map } for pid=14211 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3017.119389][ T26] audit: type=1400 audit(1552187211.010:27204): avc: denied { map } for pid=14211 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3017.256374][ T26] audit: type=1400 audit(1552187211.050:27205): avc: denied { search } for pid=14211 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:51 executing program 4: syz_emit_ethernet(0xfc, &(0x7f00000001c0)={@local, @dev, [], {@ipv4={0x800, {{0xffffff89, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}, {[@rr={0x7, 0x9, 0x5, [@loopback]}]}}, @icmp=@timestamp_reply={0x7, 0x2}}}}}, &(0x7f0000000100)) [ 3017.435108][ T26] audit: type=1400 audit(1552187211.050:27206): avc: denied { search } for pid=14211 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3017.578935][ T26] audit: type=1400 audit(1552187211.069:27207): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3017.747278][ T26] audit: type=1400 audit(1552187211.079:27208): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) r1 = semget(0x3, 0x0, 0x81) semctl$IPC_INFO(r1, 0x1, 0x3, &(0x7f0000000380)=""/119) connect$inet6(r0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) write$P9_RREADLINK(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:06:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x3d, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(r0, 0x0, 0x0) 03:06:52 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000140)}, 0xc100) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="b10b938636ea69df7b5a9984bb1bc72ef58d96e56e11df900a707f4946b1637e2096c584b9a1b4e017163fbdb35160a56c11dfbe74df97d36d19ad6a91c6fb4ad19581b8cf707131830f7a22b1b263c9da0e443c5e969ed6a0d3bc508bf75c3147447379f585759ceba0de5cda46291dc1b8f106a83e1cde43a862d95413ce2616b261ed9f79913ae781b3b843ea1b4429a750b8ccb1952a7b863d0bada9f61df6609fe368eaf47c0ce9e46a22b0d75b063deeaa94285d0c43353046e0a308296a76b0b014", 0xc5}], 0x1, &(0x7f0000000200)}, 0x8000) setsockopt$inet6_int(r0, 0x29, 0x7, &(0x7f0000000000)=0x398, 0x4) recvmsg(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@can, 0x80, &(0x7f0000000400), 0x0, &(0x7f0000000480)=""/40, 0x28}, 0x0) sendmsg(r0, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000500)="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", 0x2d5}], 0x1, &(0x7f0000003b40)}, 0x0) 03:06:52 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x80ffffff, 0x6c}}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:06:52 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) shutdown(r1, 0x0) 03:06:52 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000000180)="9bea77e53e5f") ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:06:53 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) setresuid(0x0, 0xee01, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0x6, 0x4) bind$inet6(r0, &(0x7f0000f67fe4)={0xa, 0x4e20}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2a, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[0x8000a0ffffffff], [], @multicast1}}, 0x1c) 03:06:53 executing program 0: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) r1 = semget(0x3, 0x0, 0x81) semctl$IPC_INFO(r1, 0x1, 0x3, &(0x7f0000000380)=""/119) connect$inet6(r0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) write$P9_RREADLINK(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:06:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x800002, 0x0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00\x00\x01\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, '?'}, 0x119) sendfile(r1, r2, 0x0, 0x8000fffffffe) 03:06:53 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x80ffffff, 0x6c}}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:06:53 executing program 2: clock_nanosleep(0x9, 0x1, &(0x7f00000000c0), 0x0) [ 3019.878220][ C0] net_ratelimit: 26 callbacks suppressed [ 3019.878229][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3019.889796][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3019.958819][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3019.964623][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3019.970497][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3019.976273][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:06:54 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) [ 3020.039448][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3020.045311][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3020.051244][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3020.057028][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:06:54 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000100)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) write(r1, 0x0, 0x0) 03:06:54 executing program 0: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) r1 = semget(0x3, 0x0, 0x81) semctl$IPC_INFO(r1, 0x1, 0x3, &(0x7f0000000380)=""/119) connect$inet6(r0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) write$P9_RREADLINK(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) 03:06:54 executing program 2: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x78, 0x0, 0x0) 03:06:55 executing program 1: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000070107031dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:06:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x80ffffff, 0x6c}}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) 03:06:55 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000540)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40480923, 0x0) 03:06:55 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x100000000014b03e, 0x0) ioctl$CAPI_REGISTER(r0, 0x400c4301, &(0x7f0000000100)={0x0, 0x0, 0x69c5}) write$FUSE_STATFS(r0, &(0x7f0000000200)={0x60, 0x8086}, 0x60) 03:06:55 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 03:06:55 executing program 1: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) ppoll(&(0x7f0000000100)=[{r0}], 0x1, 0x0, &(0x7f0000000180)={0x6}, 0x8) [ 3021.573836][ T26] kauditd_printk_skb: 231 callbacks suppressed [ 3021.573853][ T26] audit: type=1400 audit(1552187215.892:27440): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:56 executing program 0: r0 = socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0x0) r1 = semget(0x3, 0x0, 0x81) semctl$IPC_INFO(r1, 0x1, 0x3, &(0x7f0000000380)=""/119) connect$inet6(r0, 0x0, 0x0) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x5, 0xa0482) write$P9_RREADLINK(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000100)={[{@upperdir={'upperdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file1'}, 0x5c}]}) [ 3021.713860][ T26] audit: type=1400 audit(1552187215.921:27441): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3021.882906][ T26] audit: type=1400 audit(1552187215.951:27443): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:56 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000540)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40480923, 0x0) [ 3022.005274][ T26] audit: type=1400 audit(1552187215.921:27442): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000080)={0x20, 0x1d, 0xffffffffffffffff, 0x0, 0x0, {0x20000000005}, [@nested={0xc, 0x111, [@typed={0x5, 0x5, @pid}]}]}, 0x20}}, 0x0) [ 3022.126565][ T26] audit: type=1400 audit(1552187215.961:27444): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3022.236689][ T26] audit: type=1400 audit(1552187215.961:27445): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:56 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) [ 3022.358737][ T26] audit: type=1400 audit(1552187215.981:27446): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:56 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x80ffffff, 0x6c}}, &(0x7f0000003ff6)='OPL\x00', 0x1, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) [ 3022.501869][ T26] audit: type=1400 audit(1552187215.991:27447): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3022.628229][ T26] audit: type=1400 audit(1552187216.001:27448): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:57 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000540)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40480923, 0x0) 03:06:57 executing program 5: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000004c0)}}, 0x20) r0 = open(&(0x7f0000000140)='./file0/file0\x00', 0x202, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, 0x0, &(0x7f0000000580)) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000880)=0x2, 0xffffffffffffffe9) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000800)='/dev/rtc0\x00', 0x10000002, 0x0) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f00000008c0)) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x6, &(0x7f0000000440)={0x77359400}, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000003280)={'team0\x00', 0x0}) ioctl$HCIINQUIRY(r0, 0x800448f0, &(0x7f00000032c0)={r4, 0x8, 0x53c9dfdf, 0x7, 0x7f, 0x0, 0x1}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r3, 0x84, 0xf, &(0x7f0000000940)={0x0, @in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x28}}}, 0x1ff, 0xac4, 0x1, 0x1, 0x1}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000200)=ANY=[@ANYBLOB], 0x0) write$apparmor_current(r0, &(0x7f00000005c0)=ANY=[], 0x0) clock_settime(0x5, &(0x7f0000000640)) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000340)=0x166675f32b52acd2) setxattr$trusted_overlay_nlink(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)='trusted.overlay.nlink\x00', &(0x7f0000000840)={'L+', 0x401}, 0x28, 0x3) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000006c0)={&(0x7f0000000280), 0xc, 0x0}, 0x0) write$USERIO_CMD_REGISTER(r0, &(0x7f00000003c0)={0x0, 0x3}, 0x2) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) ioctl$VIDIOC_G_INPUT(r0, 0x80045626, &(0x7f0000000380)) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000200)={0xffff, 0x9}) ioctl$GIO_FONT(r3, 0x4b60, &(0x7f00000000c0)=""/22) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400003, 0x9, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000900)=ANY=[@ANYPTR, @ANYPTR, @ANYPTR, @ANYRES16=r0, @ANYRES32=r1, @ANYRES64, @ANYPTR64=&(0x7f0000000200)=ANY=[]], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x800000, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000740), 0xffffffffffffffff) [ 3022.765882][ T26] audit: type=1400 audit(1552187216.030:27449): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:06:57 executing program 0: r0 = socket$inet(0x2, 0x6, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000040)={@ipv4={[], [], @multicast1}, 0x0, 0x0, 0x0, 0x203}, 0x20) setsockopt(r0, 0x0, 0x40, &(0x7f0000000000), 0x0) 03:06:57 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000540)='/dev/md0\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x40480923, 0x0) 03:06:57 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x14, 0x4, 0x4, 0x400, 0x0, 0x1}, 0x2c) socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0xf, &(0x7f0000000400), 0x8) sendmsg$kcm(r0, &(0x7f0000000a80)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x0, 0x77fffb, 0x0, 0x10020000000, 0x0}, 0x2c) close(r0) 03:06:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$dmmidi(0x0, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, 0x0, 0x0) r1 = inotify_init1(0x0) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f000045fff8)={0x0, 0x0}) ptrace$setopts(0x4206, r2, 0x0, 0x0) tgkill(r2, r2, 0x8) ptrace$setsig(0x4203, r2, 0x0, &(0x7f0000000080)) getresgid(0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) 03:06:58 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=[@acquire], 0x0, 0x0, 0x0}) close(r0) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000003c0)={0xc, 0x0, &(0x7f0000000480)=[@dead_binder_done={0x400c630f, 0x1000000}], 0x0, 0xfdfdffff, 0x0}) 03:06:58 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000240)='hugetlb.2MB.max_usage_in_bytes\x00h\xc8\x8a\xa1\xe4\xc6\xb4\x1e\x19\"g\xeb\xaf\xfe\xb4\xa7\xde#^Z\x93\x8b\x981\xd0d\x12\xc7g\xb0\xf9Zb~\xe4\x88\xa0\xd5(\x00\x00\x00\x00\x00\x00\x00\x00\xa6\xbc\x18P\xaf_\x11\xde\x05b$\x9bR\xe4(h\xcd\x11I%\xa4=\xa9\xe1\xcf\xe09\x00a\xd6+\xea\x93\xed\x96\x03\x9e\xf2\x02\x96\x99\xf9?k\x95\xf7\xd14\xb0\xc4\f\xab\xd8\x86\'\xf7<\xbb\xe4W\x0fBI\xf61\xf5\xeat:\xae\x1c\x98\x04M\xf6\x96\xb2\x89\x99\xedeiDK\x90$+_LF|\xfe\xf1b', 0x2, 0x0) r2 = openat$cgroup_ro(r0, &(0x7f0000000040)='cpuset.memory_pressure\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000000) 03:06:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") syz_emit_ethernet(0x300605, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30000b, 0x3b, 0x0, @ipv4={[0x6, 0x8, 0x5, 0x2, 0x3e], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:06:58 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x4800000c0045009, &(0x7f0000000000)=0x10) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x1) 03:06:58 executing program 1: socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) r2 = socket(0xa, 0x400000001, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000100)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0xf, 0x0, 0x0) 03:06:58 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000140)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4003}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000700)='/dev/fuse\x00', 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000000600)=r1) dup2(r0, r2) 03:06:59 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x4800000c0045009, &(0x7f0000000000)=0x10) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x1) 03:06:59 executing program 5: r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req={0x80, 0x0, 0x0, 0x73d}, 0x29b) bind$nfc_llcp(r0, 0xfffffffffffffffe, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 03:06:59 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f000069affb)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r0, &(0x7f0000003980)=[{{0x0, 0x0, &(0x7f0000000940), 0x0, &(0x7f00000002c0)=""/62, 0xc, 0x4}}], 0x6de, 0x62, 0x0) 03:06:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x1, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x418002, 0x0) 03:06:59 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x4800000c0045009, &(0x7f0000000000)=0x10) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x1) 03:07:00 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000006fa8)={{0x50f}, 0x1}) 03:07:00 executing program 4: pipe(&(0x7f0000000040)) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) unshare(0x20400) openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) [ 3026.167307][ C0] net_ratelimit: 26 callbacks suppressed [ 3026.167317][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.178867][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:07:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) setsockopt$packet_int(r0, 0x107, 0x9, &(0x7f0000000000), 0x0) [ 3026.247885][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.253761][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3026.259627][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.265379][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3026.328599][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.334492][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3026.341177][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3026.347055][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") syz_emit_ethernet(0x300605, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30000b, 0x3b, 0x0, @ipv4={[0x6, 0x8, 0x5, 0x2, 0x3e], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:07:00 executing program 5: syz_genetlink_get_family_id$team(0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000180)=[@textreal={0x8, &(0x7f0000000140)="66b9810000400f322ed30cbad104ec660f38df2b0fe21526660ff85e503ede1b0f20c06635000000800f22c0b800088ec00fae470b", 0x35}], 0x1, 0x51, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 3026.631762][ T26] kauditd_printk_skb: 228 callbacks suppressed [ 3026.631777][ T26] audit: type=1400 audit(1552187220.912:27678): avc: denied { map } for pid=17078 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:01 executing program 2: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r0, 0x4800000c0045009, &(0x7f0000000000)=0x10) ioctl$int_in(r0, 0x800000c0045009, &(0x7f00000000c0)=0x1) [ 3026.820950][ T26] audit: type=1400 audit(1552187220.962:27679): avc: denied { map } for pid=17068 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x24}}, 0x0) [ 3026.973546][ T26] audit: type=1400 audit(1552187220.962:27680): avc: denied { map } for pid=17068 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:01 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r2 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$link(0x16, r1, r2) [ 3027.104643][ T26] audit: type=1400 audit(1552187220.982:27681): avc: denied { map } for pid=17078 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3027.253343][ T26] audit: type=1400 audit(1552187220.991:27682): avc: denied { map } for pid=17078 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:01 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="8cff7cf90800000000f600000800000007000000402c110001000000090000070022000000"], 0x25) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') wait4(0x0, 0x0, 0x0, 0x0) [ 3027.405055][ T26] audit: type=1400 audit(1552187221.031:27683): avc: denied { search } for pid=17068 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3027.512403][ T26] audit: type=1400 audit(1552187221.051:27684): avc: denied { search } for pid=17078 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:01 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x800) socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002f9c54e71f3be48a2b6e05a7de114f3834df22101e"], 0x17) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x40000) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, 0x0, 0x1) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) [ 3027.664315][ T26] audit: type=1400 audit(1552187221.051:27685): avc: denied { search } for pid=17068 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3027.793674][ T26] audit: type=1400 audit(1552187221.061:27686): avc: denied { search } for pid=17078 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3027.925078][T17380] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 3027.968620][ T26] audit: type=1400 audit(1552187221.081:27687): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3028.002240][T17380] netlink: 'syz-executor.1': attribute type 4 has an invalid length. 03:07:02 executing program 5: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000000, 0x10, 0xffffffffffffffff, 0x0) fchdir(r0) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) syncfs(r1) write$nbd(r2, &(0x7f0000000580)={0x67446698, 0x1, 0x0, 0x2, 0x1, "450a69560704405c67dde72ce60f3afefa023ef51aee3b1204b818a7d7f5bf2823a34f93da60cb085633f5cef13145a49728132e2f5eeb4bb9f08752b38c8294d82bc633248ff58394dd9efb8266c055e5275d03ee3927af147889def12cfd025bb4d490afdccf4931a698694ee6c2c57d02ec2bf9d40a9ab087bff32d777a75af385a2ac7529ba54a487f241c7b63f533cf9ff079df"}, 0xa6) lsetxattr$security_evm(0x0, 0x0, 0x0, 0x0, 0x1) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r2, r2, &(0x7f0000000000), 0x8080fffffffe) 03:07:02 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") syz_emit_ethernet(0x300605, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30000b, 0x3b, 0x0, @ipv4={[0x6, 0x8, 0x5, 0x2, 0x3e], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:07:02 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x24}}, 0x0) 03:07:02 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x12, 0x6, 0x4, 0x3}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000003c0)={r0, &(0x7f0000000540)}, 0x10) 03:07:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 03:07:03 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f00000001c0)) 03:07:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sm3-generic\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) splice(r1, 0x0, r4, 0x0, 0x20000000003, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000000380)=@newtfilter={0x24}, 0x24}}, 0x48000) write$binfmt_misc(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="738b7aa91a4d5a8ff60a3845162004001e560000"], 0x14) 03:07:03 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x800) socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002f9c54e71f3be48a2b6e05a7de114f3834df22101e"], 0x17) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x40000) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, 0x0, 0x1) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 03:07:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) 03:07:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x24}}, 0x0) 03:07:04 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f023c123f3188a070") syz_emit_ethernet(0x300605, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30000b, 0x3b, 0x0, @ipv4={[0x6, 0x8, 0x5, 0x2, 0x3e], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0x21, 0x0, 0x0, 0x0, [0x0, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) 03:07:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x800) socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002f9c54e71f3be48a2b6e05a7de114f3834df22101e"], 0x17) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x40000) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, 0x0, 0x1) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 03:07:05 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 03:07:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000140)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r1, 0x1, 0x0, 0x0, {}, [@FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_TYPE={0x8, 0x4, 0x1}]}, 0x24}}, 0x0) 03:07:05 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x800) socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002f9c54e71f3be48a2b6e05a7de114f3834df22101e"], 0x17) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x40000) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, 0x0, 0x1) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 03:07:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 3031.709844][ T26] kauditd_printk_skb: 214 callbacks suppressed [ 3031.709859][ T26] audit: type=1400 audit(1552187225.943:27902): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3031.882191][ T26] audit: type=1400 audit(1552187225.972:27903): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3032.014977][ T26] audit: type=1400 audit(1552187225.972:27904): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x800) socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002f9c54e71f3be48a2b6e05a7de114f3834df22101e"], 0x17) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x40000) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, 0x0, 0x1) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 03:07:06 executing program 3: openat$ppp(0xffffffffffffff9c, &(0x7f0000000940)='/dev/ppp\x00', 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, 0x0, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_NOTIFY_INVAL_INODE(0xffffffffffffffff, &(0x7f0000000380)={0x28, 0x2, 0x0, {0x3, 0x0, 0xfffffffffffffffe}}, 0x28) r1 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x0) ioctl$SG_IO(r1, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x200000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(0x0, 0x0, 0x0) chown(0x0, 0x0, 0x0) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) r2 = getpid() rt_tgsigqueueinfo(r2, r2, 0x16, &(0x7f0000000100)) ptrace(0x4206, r2) ptrace(0x8, r2) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) mmap(&(0x7f00000be000/0x3000)=nil, 0x3000, 0x0, 0x100132, 0xffffffffffffffff, 0x1) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x200000, 0x0) getsockopt$bt_BT_VOICE(r3, 0x112, 0xb, &(0x7f00000000c0)=0x7, 0x0) socket$caif_stream(0x25, 0x1, 0x2) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, 0x0, 0xe) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f00000001c0)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x28013, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x7, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) [ 3032.180986][ T26] audit: type=1400 audit(1552187226.022:27905): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3032.309198][ T26] audit: type=1400 audit(1552187226.022:27906): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3032.426357][ T26] audit: type=1400 audit(1552187226.022:27907): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3032.456269][ C0] net_ratelimit: 26 callbacks suppressed [ 3032.456277][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3032.467742][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3032.536938][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3032.542757][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3032.548619][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3032.554857][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3032.571409][ T26] audit: type=1400 audit(1552187226.062:27908): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3032.618996][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3032.624803][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3032.630679][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3032.636447][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:06 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 03:07:07 executing program 1: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) [ 3032.785097][ T26] audit: type=1400 audit(1552187226.121:27909): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10034, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x0, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) [ 3033.045489][ T26] audit: type=1400 audit(1552187226.121:27910): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3033.213512][ T26] audit: type=1400 audit(1552187226.161:27911): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x800) socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002f9c54e71f3be48a2b6e05a7de114f3834df22101e"], 0x17) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x40000) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, 0x0, 0x1) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 03:07:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x800) socket$packet(0x11, 0x0, 0x300) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x1fe, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="00002f9c54e71f3be48a2b6e05a7de114f3834df22101e"], 0x17) perf_event_open(&(0x7f0000000800)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000180)='./bus\x00', 0x9) unlink(&(0x7f0000001e00)='./bus\x00') sendfile(r1, r1, &(0x7f0000000000), 0x8080fffffffe) syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, 0x0, 0x40000) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, 0x0, 0x1) mkdir(&(0x7f0000001540)='./file0\x00', 0x0) 03:07:08 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 03:07:08 executing program 1: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 03:07:08 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) timer_settime(0x0, 0x0, &(0x7f0000000040)={{}, {0x0, 0x989680}}, &(0x7f0000040000)) 03:07:09 executing program 5: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 03:07:09 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000300)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x7f, 0x400200007fe, &(0x7f0000000080)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0x120001644) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000280)='nv\x00', 0x2) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000740)=@nfc, 0x80, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x7ffff000}], 0x1, &(0x7f0000000200)=""/20, 0xc2b}, 0x100) 03:07:09 executing program 1: setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x10) r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000040)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000000)={0x18, 0x0, {0x2000000000002, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r1, &(0x7f000000d180), 0x4000000000000eb, 0x0) bind$packet(r0, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r0, 0x107, 0x5, &(0x7f0000001000), 0xc5) 03:07:09 executing program 0: socketpair$unix(0x1, 0x2000000005, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='user.syz\x00', 0x0, 0x0, 0x0) 03:07:09 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000180)="2e0000001d0081e753fcfb7c55885c316700e00f80ecdb4cb9d91f63190400000000000000fb120001000e00da1b", 0x2e}], 0x1}, 0x0) 03:07:09 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x14, 0x0, &(0x7f0000000200)) 03:07:09 executing program 5: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) sysinfo(&(0x7f00000007c0)=""/154) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") ioctl$BLKPG(r0, 0x1269, &(0x7f00000006c0)={0x1, 0x0, 0x0, &(0x7f0000000800)}) 03:07:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x3) sendto$ax25(r0, 0x0, 0x0, 0x880, 0x0, 0x0) [ 3036.127528][T19629] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.4'. 03:07:10 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0x408c5333, &(0x7f0000000200)={0x20000, 0x0, 'client0\x00', 0x0, "5094600ef4b335f9", "df411899e8514d710d749a40a0c99b4238f8a789e28232f9c6d30b23fbedde83"}) 03:07:10 executing program 0: r0 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_SUBSCRIBE_EVENTS(r0, 0xc0045516, &(0x7f0000000040)=0xfffffffffffffff9) 03:07:10 executing program 5: clone(0x4010003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2f) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000180)="3c6d02ca84da43134b015f9d00a880006c7740d74e0ffae22d06ddb07fe1ac057c1a4c8f971b3c583bb9119d7750663e125a9c4373c4b6aea56685da545365c8105e0a3b1ac5a7a34adcc2a9b96dc868186eb4ffefba4c6c763373cf5fad3e7ab624ad94d88977c23e519c26e5ad5ee191c0b476aba225bff2a789e3362cfcd01d4f3e8c648b") ptrace$cont(0x7, r0, 0x0, 0x0) [ 3036.754961][ T26] kauditd_printk_skb: 247 callbacks suppressed [ 3036.754986][ T26] audit: type=1400 audit(1552187230.953:28159): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:11 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000004c0)) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/checkreqprot\x00', 0x80882, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0x6f, &(0x7f0000000200), &(0x7f0000000300)=0x4) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000540)={'syz_tun\x00', {0x2, 0x0, @dev}}) 03:07:11 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x20000000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000}}) [ 3036.877064][ T26] audit: type=1400 audit(1552187230.953:28160): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3036.992966][ T26] audit: type=1400 audit(1552187230.973:28161): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3037.121091][ T26] audit: type=1400 audit(1552187230.993:28162): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3037.262165][ T26] audit: type=1400 audit(1552187231.003:28163): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:11 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af24, &(0x7f00000000c0)) 03:07:11 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r0, r1) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000200)=@l2, 0x80, &(0x7f00000005c0), 0x0, &(0x7f0000000600)=""/84, 0x54}}, {{&(0x7f0000000680)=@l2, 0x80, &(0x7f0000000a40), 0x0, &(0x7f0000000ac0)=""/147, 0x93}}], 0x4000000000002ce, 0x62, 0x0) 03:07:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000000)={0x0, 0xa000}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x3b1, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) ioctl$KVM_NMI(r2, 0xae9a) readv(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 3037.396821][ T26] audit: type=1400 audit(1552187231.251:28164): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3037.522015][ T26] audit: type=1400 audit(1552187231.251:28165): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:11 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x20000000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000}}) [ 3037.675053][ T26] audit: type=1400 audit(1552187231.251:28166): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3037.818484][ T26] audit: type=1400 audit(1552187231.300:28167): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:12 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:07:12 executing program 5: userfaultfd(0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000080)="68bd0000d7ebd3") ioctl$KVM_RUN(r3, 0xae80, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 3037.989425][ T26] audit: type=1400 audit(1552187231.300:28168): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:12 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='cmdline\x00\xb1R@L\x9a\xe1\xbf\xe5m\vP') ioctl$KVM_IRQ_LINE(0xffffffffffffffff, 0x4008ae61, &(0x7f0000000440)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x5) get_mempolicy(0x0, &(0x7f00000001c0), 0x1ff, &(0x7f0000ffc000/0x4000)=nil, 0x3) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'syzkaller0\x00', 0x100}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x3f000000) write$evdev(0xffffffffffffffff, &(0x7f0000000440), 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/rfkill\x00', 0x0, 0x0) setsockopt$nfc_llcp_NFC_LLCP_MIUX(r2, 0x118, 0x1, &(0x7f0000000240)=0x80000000, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000180)={r3, 0x50, &(0x7f0000000380)}, 0x10) r4 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x487, &(0x7f0000000340), &(0x7f0000000400)=0x30) add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}, 0x4) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) add_key$user(&(0x7f0000000600)='user\x00', &(0x7f0000000640)={'syz', 0x0}, &(0x7f0000000700)="503e63aaf2f1edb2dfa9770f12313b4b7b224b07a5641b02a335b4357859bf7f864c6d8e28dd405c2ae69e1f8607d314788cba4ff7fe64b4d0a69b87719c5d340ada6a59ef1060ad8cb6d2f36f52a7047db5b35018891d407bf0ad0d122bb1c9b9f8bc6fdbaa2364574e57cd1a65", 0x6e, 0xfffffffffffffffc) openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000200)={0x7ff, 0xa119, 0x3, 0x6, 0x5, 0x3}) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0x0) ioctl$SG_GET_PACK_ID(0xffffffffffffffff, 0x227c, 0x0) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x8000, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r1, 0xc4c85513, &(0x7f00000007c0)={{0x6, 0x4, 0x7fff, 0x100, '\x00', 0xfffffffffffffff9}, 0x1, [0x8, 0x8, 0x2, 0x9, 0x0, 0x8, 0x0, 0x757, 0x7fff, 0x1, 0x4137a34b, 0x5, 0x10001, 0x101, 0x5, 0x2, 0x396df097, 0x100000000, 0x100000001, 0x1ddb, 0x3, 0x1, 0x59, 0x4, 0x80, 0x114c000000000, 0x0, 0x81, 0x5, 0x8, 0x47e0, 0x672f, 0x0, 0x1, 0x0, 0xc3e, 0x7, 0x0, 0x2, 0xfffffffffffffffb, 0x183d, 0x2, 0x3, 0x5, 0x4, 0x8, 0x40, 0x80000001, 0x1000, 0x7, 0xccd8, 0xe132, 0x9, 0x47d7, 0xf51, 0x1, 0x8b0, 0x80000001, 0x1, 0x7, 0x6, 0x6, 0x7, 0x4b47, 0x2, 0x3, 0xfffffffffffffc01, 0x7, 0x20, 0x100000000, 0x4, 0x8001, 0xfff, 0x6, 0xf4, 0x4, 0x3, 0x810b, 0x0, 0xfff, 0x2a, 0x3, 0x85, 0xbe, 0x0, 0x7fffffff, 0x7, 0xa7c4, 0x2, 0x0, 0x5e89dd93, 0x8001, 0x7, 0xff, 0x0, 0x7fffffff, 0x0, 0xd5, 0x8, 0xff, 0x69, 0x4, 0x0, 0x0, 0xeefa, 0xfffffffffffffc01, 0x8000, 0x7, 0x7, 0x8, 0x8, 0x1640c913, 0x7fffffff, 0x0, 0x6, 0x6, 0x752, 0x8000, 0x3, 0x1, 0x5, 0x6a98, 0x6, 0x7fff, 0xb14, 0x5, 0x9, 0xe6], {r5, r6+10000000}}) 03:07:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'gretap0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=@newlink={0x34, 0x10, 0x809, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIAS={0x14, 0x14, 'bond_slave_0\x00'}]}, 0x34}}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@setlink={0x24, 0x13, 0x101, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_IFALIASn={0x4}]}, 0x24}}, 0x0) 03:07:12 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x20000000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000}}) [ 3038.745352][ C0] net_ratelimit: 26 callbacks suppressed [ 3038.745360][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3038.756911][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3038.825951][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3038.831804][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3038.837665][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3038.843433][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:07:13 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) [ 3038.906626][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3038.912494][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3038.918408][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3038.924192][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:13 executing program 4: r0 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x20000000, 0x0) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f00000000c0)={0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x4, 0x1000000}}) 03:07:13 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:07:14 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x20032600) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) write$P9_RFLUSH(r0, 0x0, 0x0) 03:07:14 executing program 5: syz_open_dev$binder(&(0x7f00000002c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) add_key(0x0, &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) r3 = memfd_create(&(0x7f00000001c0)='/delo\xff\a\x00\x00\x00\x00', 0x0) pwritev(r3, &(0x7f0000000480)=[{&(0x7f00000004c0)="2bd83b00", 0x4}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) sendfile(r1, r2, 0x0, 0x2000006) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000380)={&(0x7f0000000000), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 03:07:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x7f01000000000000}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 03:07:14 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:07:14 executing program 4: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000300)={0x2, 0x0, [{0x1, 0x0, 0x0}, {0x0, 0x0, 0x0}]}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000040)=ANY=[]) 03:07:14 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:07:14 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x7f01000000000000}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) 03:07:15 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:07:15 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001d80)={'tunl0\x00', 0x0}) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, r2}, 0x58) 03:07:15 executing program 5: r0 = socket$inet(0x10, 0x4004000000000003, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002a0007021dfffd946fa2830020200a000500000000030000000000000000ff7e", 0x24}], 0x1}, 0x0) 03:07:15 executing program 1: setrlimit(0x8, &(0x7f00000a3ff0)) mlockall(0x3) 03:07:15 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x7f01000000000000}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) [ 3041.806068][ T26] kauditd_printk_skb: 201 callbacks suppressed [ 3041.806083][ T26] audit: type=1400 audit(1552187235.964:28370): avc: denied { map } for pid=21008 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3041.875412][ T26] audit: type=1400 audit(1552187235.984:28371): avc: denied { map } for pid=21008 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3042.039726][ T26] audit: type=1400 audit(1552187236.023:28372): avc: denied { map } for pid=21008 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:16 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x0, 0x0, &(0x7f0000000200)) timer_getoverrun(0x0) 03:07:16 executing program 5: r0 = socket$inet(0x10, 0x4004000000000003, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002a0007021dfffd946fa2830020200a000500000000030000000000000000ff7e", 0x24}], 0x1}, 0x0) 03:07:16 executing program 2: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000140)='/dev/md0\x00', 0x80, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f00000000c0)=0x1000) 03:07:16 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) [ 3042.200492][ T26] audit: type=1400 audit(1552187236.063:28373): avc: denied { map } for pid=21008 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:16 executing program 5: r0 = socket$inet(0x10, 0x4004000000000003, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002a0007021dfffd946fa2830020200a000500000000030000000000000000ff7e", 0x24}], 0x1}, 0x0) [ 3042.336858][ T26] audit: type=1400 audit(1552187236.063:28374): avc: denied { map } for pid=21008 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:16 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{0x18, 0x0, 0x7f01000000000000}, [@alu={0x201a7f1b, 0x0, 0x201a7fd7, 0xa, 0x0, 0xff00}]}, &(0x7f0000000000)='\x1dNL\xc0\x00', 0x20000, 0x436, &(0x7f00001a7f05)=""/251}, 0x48) [ 3042.514941][ T26] audit: type=1400 audit(1552187236.093:28375): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3042.652892][ T26] audit: type=1400 audit(1552187236.093:28376): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3042.827166][ T26] audit: type=1400 audit(1552187236.103:28377): avc: denied { search } for pid=21008 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:17 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000080)={0x1, 0x0, [0x10000040000105]}) [ 3042.942797][ T26] audit: type=1400 audit(1552187236.123:28378): avc: denied { search } for pid=21008 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:17 executing program 5: r0 = socket$inet(0x10, 0x4004000000000003, 0x0) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000002a0007021dfffd946fa2830020200a000500000000030000000000000000ff7e", 0x24}], 0x1}, 0x0) [ 3043.069138][ T26] audit: type=1400 audit(1552187236.132:28379): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:17 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 03:07:17 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mount$9p_tcp(&(0x7f0000000080)='127.0.0.1\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x0, &(0x7f0000000300)={'trans=tcp,', {'port'}, 0x2c, {[{@version_L='version=9p2000.L'}]}}) 03:07:17 executing program 0: syz_open_procfs(0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) mount$fuseblk(&(0x7f0000000180)='/dev/loop0\x00', &(0x7f00000001c0)='.//ile0\x00', 0x0, 0x8, &(0x7f0000000800)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x400}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize'}}]}}) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 03:07:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCFLSH(r0, 0x540f, 0x70a000) 03:07:18 executing program 3: syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') ioctl$GIO_FONT(0xffffffffffffffff, 0x4b60, 0x0) mkdir(&(0x7f0000000640)='./file0\x00', 0x8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000600), &(0x7f0000000580)=0x8) r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000005c0)=0x2, 0x275) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(0xffffffffffffffff, 0x28, 0x6, 0x0, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000240)='/proc/capi/capi20\x00', 0x40100, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000840)={r0, r0, 0x5, 0x40, &(0x7f0000000380)="8c87d3848c83517fc0f0e692b620dcce06059a304060c520ace43145813d05ee49997f0a0e4a7e1c2956e05bcc44bb855e0dd200863d57eedafb781af894fb71", 0x4, 0x0, 0x7fffffff, 0x3, 0x4, 0x2, 0x3, 'syz1\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffff9c, 0x50, &(0x7f00000003c0)}, 0x10) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x0, 0x100000001, 0x40, 0x0, 0xea84, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x5}) r3 = getpid() fcntl$lock(r1, 0x6, &(0x7f0000000480)={0x0, 0x1, 0x6, 0x9, r3}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000002c0), &(0x7f0000000300)=0x8) sendmsg$NBD_CMD_STATUS(r0, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000540)={&(0x7f00000007c0)=ANY=[@ANYBLOB], 0x1}}, 0x845) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000010c0)) symlinkat(&(0x7f0000000680)='./file0\x00', r2, &(0x7f0000000700)='./file0\x00') ioctl$VIDIOC_G_INPUT(0xffffffffffffffff, 0x80045626, &(0x7f0000000200)) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='nfs\x00', 0x0, &(0x7f0000000000)) r4 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) accept$ax25(r4, &(0x7f00000004c0)={{0x3, @default}, [@null, @bcast, @remote, @rose, @remote, @remote, @bcast, @default]}, &(0x7f0000000540)=0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x90, &(0x7f0000000780)={@broadcast, @broadcast, [], {@x25={0x805, {0x0, 0x9, 0xfd, "7473b06e53a0aae5bd753bfef95759270a3f5bb5b77bcbcc9e726199ad754784d0560a0cd530e99249f9bb42ef790e75808d84e43f069ebad238fd22479d04745e8c12271dbfc92a91f8adf13617433d270c6b316044bc35ed427b64775f9b7e47a004ff05cd56cc44422251164e89d53de586a8238d31c579b79b4f47f611"}}}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) 03:07:18 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0x2, &(0x7f0000000040)={0x0, 0x2000000}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x403, 0x2000000000032, 0xffffffffffffffff, 0x0) 03:07:18 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) [ 3044.870885][T21599] mmap: syz-executor.2 (21599): VmData 35184640 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. 03:07:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x44000) [ 3045.034403][ C0] net_ratelimit: 26 callbacks suppressed [ 3045.034411][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3045.045950][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:07:19 executing program 5: socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r0 = socket$inet6(0xa, 0x1000000000002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/autofs\x00', 0x4000, 0x0) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000005c0)) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000040)={&(0x7f0000000440)=ANY=[@ANYBLOB="9287b748246deeca588edacd5c1cc596a848a41b96d72d9ff1ffcd245d4623bea592fa911a59141ad79770daa350bbd501b4cb95cf19700700000000000000625d08ef137426f4997e282f6859c37970b30963f2151244636d34e1d3cc668e8b4f8843a8483d66b09d4b6f5245c7494f70e75590d2eacc2773f295290a92d6f061f3d87a22968a81d80da9a6c39f5c7aa09f49456049763d7bb1efb62c04bd5db0a47ce47c565dbf107ab9605a473e04c7e779a0c244"], 0x1}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='net/ip_vs_stats_percpu\x00') fcntl$setstatus(r2, 0x4, 0x4800) r3 = socket$inet6(0xa, 0x6, 0x0) sendmsg$key(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=ANY=[]}}, 0x8811) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) write$UHID_INPUT2(r2, &(0x7f00000002c0)={0xc, 0xa2, "fb36accd806ac449657634b2a49b8a500a875ebaf50f1996bc9b63635664dca872f7acfdf6dfa6255aaf92bf8552b2d6f0f15f6c7b255006ae4e79c0a12371310827b2db5ec1e305f0351909afb5a3aed1efbff2929cc250feac9c0267463b8c8eae54a06997c56faf3a2bcf63e3fd62c9f78b4c204fdfb51d7f5989ee35822bab0191f8fc6ac1623e4b8dfa4a584f4486baf660e2796e71b0c5ea8db0a7b881e0ad"}, 0xa8) r4 = socket$inet_dccp(0x2, 0x6, 0x0) listen(r3, 0x1000002) setsockopt(r4, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) ioctl$PPPIOCGMRU(r2, 0x80047453, &(0x7f0000000240)) write$binfmt_aout(r4, &(0x7f00000006c0)={{0x10b, 0x81, 0x96, 0x38c, 0x14, 0x800, 0x293, 0x4}, "257121932ac5855c9aeaa53c2c06f18b76dcb57514c1bf7cf59cff9efd0744ad00d059371ad18f122f362e032915895d972954856d6e9b094a24612910b95d966a3675398267ada0a3ca360d4157ceebe5582ee63aaf49fa6cb7b153d0dc6f32493d76355b343bac0188ebbece125fca3e8f633955aaeec7b21f2af983446ea9709d8fb2737bca530eed666d7546651a8dc6d4328a4bfa982fe576cc948cde7bd0c308e0be011fe4ec57f7c75745307679b0ed92bd458fac41eaead15544b9fb7c8a95b735828ee6"}, 0xe8) connect$inet(r4, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000540)={@ipv4={[], [], @loopback}, 0x400, 0x1, 0xff, 0x2, 0x400, 0x3ff, 0xfff}, 0x20) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) r5 = accept(r3, 0x0, &(0x7f00000001c0)=0x281) r6 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000000, 0x10110, r2, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000180)={r6}) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r4, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r4, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) 03:07:19 executing program 2: setresuid(0x0, 0xee01, 0x0) r0 = geteuid() setresuid(r0, 0x0, 0x0) r1 = getuid() ioprio_set$uid(0x2, r1, 0x0) [ 3045.113412][T21175] 9pnet: p9_fd_create_tcp (21175): problem connecting socket to 127.0.0.1 [ 3045.122161][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3045.122218][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3045.122308][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3045.122352][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3045.195631][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3045.201468][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3045.207367][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3045.213140][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:19 executing program 1: openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file0/file0\x00', 0x0) syz_open_dev$rtc(0x0, 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x4841ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="8cff7c1fcf7c4707"], 0x8) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x7) wait4(0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 03:07:19 executing program 4: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000c40)='./file0\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000000)='system_u:object_r:cpu_online_t:s0\x00', 0x22, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getdents64(r0, &(0x7f0000000200)=""/34, 0x56) 03:07:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$l2tp(0x18, 0x1, 0x1) connect$l2tp(r1, &(0x7f0000000200)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x0, @multicast2}, 0x4}}, 0x2e) r2 = socket$l2tp(0x18, 0x1, 0x1) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) connect$l2tp(r2, &(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x1, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x3a) 03:07:20 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000480)={0x26, 'aead\x00', 0x0, 0x0, 'morus1280-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000180)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000500)="ce", 0x1}], 0x1}, 0x0) sendmmsg$alg(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@op={0x18}], 0x18}], 0x1, 0x0) 03:07:20 executing program 1: socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x100000000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x6) unlinkat(r0, &(0x7f0000000040)='./file0\x00', 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) gettid() r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/\x00\x00\x00\x00') fstat(r1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, 0x0, r2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x4, 0x608401) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0x0, 0x0) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000240)={'bond_slave_0\x00\x0e\x00'}) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000000)={'bond_slave_0\x00\x00\x00\x02', {0x2, 0x0, @local}}) ioctl$sock_inet_SIOCGIFADDR(0xffffffffffffffff, 0x8915, &(0x7f0000000000)={'nr0\x00', {0x2, 0x0, @multicast1}}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x208240, 0x0) write$cgroup_int(r4, &(0x7f0000000080)=0x1, 0x12) pkey_alloc(0x0, 0xffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x13d}], 0x1, 0x0) r5 = msgget$private(0x0, 0x104) msgctl$IPC_STAT(r5, 0x2, &(0x7f00000003c0)=""/10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r6, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) io_setup(0x8, &(0x7f0000000080)) 03:07:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) [ 3046.860334][ T26] kauditd_printk_skb: 235 callbacks suppressed [ 3046.860349][ T26] audit: type=1400 audit(1552187240.984:28615): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3046.956670][ T26] audit: type=1400 audit(1552187240.984:28616): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3047.076258][ T26] audit: type=1400 audit(1552187241.024:28617): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:21 executing program 3: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) clone(0x100002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, r0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x1e2ba62e) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 03:07:21 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$sock_x25_SIOCDELRT(r0, 0x890c, 0x0) 03:07:21 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x44000) 03:07:21 executing program 5: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) syz_open_dev$dspn(&(0x7f0000000740)='/dev/dsp#\x00', 0x3, 0x200) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000580)='/dev/cachefiles\x00', 0x80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0x0, &(0x7f00000002c0)) r1 = socket(0x10, 0x2, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x6, 0x400040) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) chown(&(0x7f00000001c0)='./file0\x00', r2, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000200)='system.posix_acl_access\x00', 0x0, 0x0, 0x1) getsockopt$netlink(r1, 0x10e, 0xf, 0x0, &(0x7f00000000c0)) chdir(&(0x7f0000000340)='./file0\x00') symlink(&(0x7f0000000800)='./file0/file0\x00', &(0x7f00000007c0)='./file0\x00') clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, &(0x7f0000000380), 0xffffffffffffffff) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000640)={&(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x8}, 0x10) accept$packet(0xffffffffffffffff, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000440)=""/244) ioctl$SG_GET_NUM_WAITING(0xffffffffffffffff, 0x227d, 0x0) [ 3047.259797][ T26] audit: type=1400 audit(1552187241.034:28618): avc: denied { search } for pid=24291 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3047.397629][ T26] audit: type=1400 audit(1552187241.153:28619): avc: denied { map } for pid=22092 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3047.506463][ T26] audit: type=1400 audit(1552187241.163:28620): avc: denied { map } for pid=22092 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3047.662344][ T26] audit: type=1400 audit(1552187241.163:28621): avc: denied { map } for pid=22092 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:21 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000080)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 3047.769370][ T26] audit: type=1400 audit(1552187241.183:28622): avc: denied { map } for pid=22092 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3047.902220][ T26] audit: type=1400 audit(1552187241.302:28623): avc: denied { map } for pid=22092 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3048.015806][ T26] audit: type=1400 audit(1552187241.302:28624): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:22 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:22 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x44000) 03:07:22 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$sock_x25_SIOCDELRT(r0, 0x890c, 0x0) 03:07:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000000540)=@newsa={0x140, 0x10, 0x801, 0x0, 0x0, {{@in, @in6=@mcast1}, {@in, 0x0, 0x6c}, @in=@broadcast, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @etimer_thresh={0x8, 0xb}]}, 0x140}}, 0x0) 03:07:23 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_int(r1, &(0x7f0000000200), 0x44000) 03:07:23 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$sock_x25_SIOCDELRT(r0, 0x890c, 0x0) 03:07:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:24 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$sock_x25_SIOCDELRT(r0, 0x890c, 0x0) 03:07:24 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000ac0)={'syz0\x00', {}, 0x3a}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) write$input_event(r0, &(0x7f0000000100)={{0x0, 0x2710}, 0x15, 0x0, 0xfffffffffffffffe}, 0x18) 03:07:24 executing program 3: r0 = socket$packet(0x11, 0xa, 0x300) recvmmsg(r0, &(0x7f000000bcc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:07:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:25 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000c8d000)={&(0x7f0000bfdfdc)={0x20, 0x0, 0x1, 0x800000001, 0x0, 0x0, {}, [@nested={0xc, 0x2, [@typed={0x8, 0x1, @ipv4=@multicast2}]}]}, 0x20}}, 0x0) 03:07:25 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x10000, &(0x7f0000001b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x4}}, {@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}]}}) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000500)=""/77, 0x4d}], 0x1, &(0x7f00000005c0), 0x0, 0x7fff}, 0x102) write$UHID_CREATE2(r1, &(0x7f0000000400)=ANY=[@ANYRES64=r1], 0x1) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') ioctl$TIOCGETD(r3, 0x5424, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=ANY=[@ANYBLOB="bfe3f3a098150000000000000000"], 0x0, 0x0, 0x0, 0x0) ioctl$KIOCSOUND(r1, 0x4b2f, 0x7f) mount(&(0x7f0000001c00)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r3, @ANYPTR=&(0x7f0000001c80)=ANY=[@ANYRES16=0x0, @ANYRES32=r0, @ANYPTR=&(0x7f0000001dc0)=ANY=[@ANYRES32=r3, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESHEX=r0, @ANYPTR, @ANYPTR, @ANYPTR, @ANYRESDEC=r0, @ANYRESDEC, @ANYRESHEX=r0], @ANYRES32=r1, @ANYRES32, @ANYRESHEX=0x0, @ANYRES64=r1], @ANYRESOCT=0x0, @ANYRESDEC=r3, @ANYRES16=r2], &(0x7f0000001d40)='./file0\x00', &(0x7f0000000a80)='hugetlbfs\x00', 0x4, &(0x7f0000001e80)) unshare(0x800) mknod$loop(&(0x7f0000000440)='./file0\x00', 0x6000, 0x1) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000b00)=""/4096) mount(&(0x7f0000000380), &(0x7f0000000340)='./file0\x00', &(0x7f0000fdb000)='ubifs\x00', 0x80010, 0x0) ioctl$VHOST_NET_SET_BACKEND(r3, 0x4008af30, &(0x7f00000003c0)={0x3, r3}) getsockopt$IP_VS_SO_GET_DAEMON(r1, 0x0, 0x487, &(0x7f0000000840), &(0x7f0000000880)=0xfffffffffffffd13) mount(&(0x7f00000005c0)=ANY=[@ANYBLOB="ae5fb1234aef3fab7d8294fb089f3fd922"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f0000001d00)='./file0\x00', &(0x7f0000001d80)='./file0\x00') mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000240)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000002200)=""/4096, 0x1000}], 0x1, 0x0) preadv(r3, &(0x7f0000000800)=[{&(0x7f0000000640)=""/149, 0x95}, {&(0x7f0000000700)=""/196, 0xc4}], 0x2, 0x0) ioctl$int_out(0xffffffffffffffff, 0x2, &(0x7f00000001c0)) ioctl$RTC_UIE_OFF(r3, 0x7004) utimes(&(0x7f0000000280)='./file1\x00', &(0x7f0000000480)={{0x77359400}, {0x77359400}}) alarm(0x6a) sendmsg(r3, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000008c0)="85b847c48f1eac744a047d2cbcb68aee44fd933631bb2af43e639910cd12646afa63c6102107cc2288e5583ad7ae2ab43369b9bb86d138023bba664c0e63a6aa9793af110267487f5a1907f6c254377725bca428f4da7753fbe28672dc77fcf8e6d2451bf4ead6e7c95e956747f19e582914b9a4bc7b435c60beaedf3e9f3eeb8ad98ed8a44cc6942944b2d3cb8b8bfde84902ea9b0c837722cea88fd39ab0a7949bcbf81fbf2d1ba9cfabd2cf0811d6de7912706e0a82b8b4c91b6b8f6d5c9f457015cc26bf713a0400d43ac86783b2d209099897ba0a", 0xd7}], 0x1, 0x0, 0x0, 0x4000}, 0x48080) close(r0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000380)={{}, {0x0, 0x2710}}) 03:07:25 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x4106}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_flags=0x1}) [ 3051.320792][T23304] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 3051.330283][ C0] net_ratelimit: 26 callbacks suppressed [ 3051.330292][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3051.330353][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3051.404087][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3051.409930][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3051.415820][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3051.421601][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3051.484805][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3051.490673][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3051.496583][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3051.502395][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:25 executing program 0: recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 03:07:25 executing program 2: pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r1, &(0x7f00000000c0), 0x2, 0x0) 03:07:25 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x31, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x13, &(0x7f0000000100), 0x4) 03:07:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x3, 0x19) connect$inet(r1, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x21, &(0x7f0000000380)={0x0, {{0x2, 0x0, @multicast1}}}, 0x90) [ 3051.938250][ T26] kauditd_printk_skb: 110 callbacks suppressed [ 3051.938265][ T26] audit: type=1400 audit(1552187246.015:28735): avc: denied { map } for pid=23505 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:26 executing program 5: r0 = socket$inet(0x2b, 0x1, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000540)={'ip6tnl0\x00', &(0x7f0000000500)=@ethtool_sset_info={0x43}}) [ 3052.080647][ T26] audit: type=1400 audit(1552187246.064:28736): avc: denied { map } for pid=23505 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3052.197287][ T26] audit: type=1400 audit(1552187246.104:28737): avc: denied { search } for pid=23505 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3052.316002][ T26] audit: type=1400 audit(1552187246.104:28738): avc: denied { search } for pid=23505 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:26 executing program 2: clock_nanosleep(0xfffffffffffffffc, 0x0, &(0x7f0000000000)={0x0, 0x1c9c380}, 0x0) [ 3052.445789][ T26] audit: type=1400 audit(1552187246.114:28739): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3052.497805][ T26] audit: type=1400 audit(1552187246.114:28740): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3052.524336][ T26] audit: type=1400 audit(1552187246.114:28741): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 3052.623368][ T26] audit: type=1400 audit(1552187246.144:28742): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:26 executing program 0: recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 03:07:26 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet6(0xa, 0x40000080806, 0x0) bind$inet6(r1, &(0x7f000047b000)={0xa, 0x4e20}, 0x1c) listen(r1, 0xfffffffffffffffe) r2 = socket$inet6(0xa, 0x6, 0x0) setsockopt$inet6_int(r2, 0x29, 0x6, &(0x7f0000000000), 0x4) connect$inet6(r2, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) [ 3052.764443][ T26] audit: type=1400 audit(1552187246.144:28743): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendto$unix(r1, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0) ppoll(&(0x7f0000000040)=[{r1}], 0x1, &(0x7f0000000080)={0x0, 0x1c9c380}, 0x0, 0x0) [ 3052.875588][ T26] audit: type=1400 audit(1552187246.233:28744): avc: denied { create } for pid=23633 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:07:27 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x40000000001, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x3, 0x7, 0x0, 0x1, 0x5}]}, &(0x7f0000f6bffb)='GPL\x1d', 0x80, 0x4e1, &(0x7f00001a7f05)=""/251}, 0x48) 03:07:27 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000100)) 03:07:27 executing program 0: recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 03:07:27 executing program 2: mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0xa, &(0x7f0000f09000/0x2000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='environ\x00') preadv(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/113, 0x71}], 0x190, 0x0) 03:07:27 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$NBD_SET_TIMEOUT(r0, 0xab09, 0x0) 03:07:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 03:07:28 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f610500022881001f00000500000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:07:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000140)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 03:07:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x20601, 0x3f000000) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000200)={0x0, 0xa119, 0x3, 0x6, 0x5}) 03:07:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x10000000003, 0x6) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000180)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in=@multicast1, 0x0, 0xff}, 0x0, @in6=@local, 0x0, 0x4, 0x0, 0x94ad51f}}, 0xe8) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:07:28 executing program 0: recvfrom$llc(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 3054.608240][T24549] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:07:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000140)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 03:07:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f610500022881001f00000500000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:07:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 03:07:29 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x10, &(0x7f0000000180), 0x8) 03:07:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000140)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) 03:07:29 executing program 0: r0 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, &(0x7f0000000040)={'filter\x02\x00', 0x2, [{}, {}]}, 0x48) [ 3055.699791][T24992] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:07:29 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f610500022881001f00000500000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 3055.814355][T25004] sctp: [Deprecated]: syz-executor.5 (pid 25004) Use of struct sctp_assoc_value in delayed_ack socket option. [ 3055.814355][T25004] Use struct sctp_sack_info instead 03:07:30 executing program 5: bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000140)) getpgid(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, 0x0, 0x10000, 0x0) bind$vsock_stream(r1, &(0x7f0000000640)={0x28, 0x0, 0xffffffff, @hyper}, 0x10) sysinfo(&(0x7f00000007c0)=""/154) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000040)={0x1, 0x0, 0x0, &(0x7f0000000800)}) syz_genetlink_get_family_id$tipc(&(0x7f0000000400)='TIPC\x00') openat$hwrng(0xffffffffffffff9c, 0x0, 0x12c00, 0x0) r2 = socket$kcm(0x29, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, &(0x7f00000006c0)={r2}) 03:07:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000008140), 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vhost-vsock\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000140)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) [ 3056.477285][T25148] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:07:30 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000)=""/56, 0x38) 03:07:30 executing program 0: r0 = syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0x0, 0x40400) ioctl$RTC_SET_TIME(r0, 0x4024700a, &(0x7f0000000380)={0x1a, 0x0, 0x11, 0x5, 0x7, 0x0, 0x0, 0x53}) socketpair(0x1, 0x0, 0x5, 0x0) prctl$PR_SET_MM_AUXV(0x23, 0xc, &(0x7f0000000500)="4115e74d23030a4e043bec88159b24c7db827f9f43f9a68ff330c16b7594f0f8b10f971bd5cc29202efb6a45a5d7ccfd4f36bb9593c1d26a7b36793cc100ffe88adc578a46fcb77f1a763fd05ae000e9c132abe9772674eff11fc3c057ce89482ff594f1473fc1fc27cd5addec0708135663da739f566520bb314ed24e766d09642422334a2c57353ea059523114c8c6a05f", 0x92) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000003c0)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ffb000/0x4000)=nil, 0x7000) shmdt(0x0) clone(0x4000, &(0x7f0000000380), 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xa000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x80a102001ff8, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) mount(&(0x7f0000001440), &(0x7f0000343ff8)='./file0\x00', &(0x7f0000fb5ffc)='nfs\x00', 0x0, &(0x7f000000a000)) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 03:07:30 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x10, 0x2, 0x0) sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="24000000180007041dfffd946f610500022881001f00000500000800080005000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:07:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f000001b000)={@multicast2, @remote, @loopback}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) [ 3056.995174][ T26] kauditd_printk_skb: 116 callbacks suppressed [ 3056.995189][ T26] audit: type=1400 audit(1552187251.035:28861): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) ioctl$KDSKBMODE(0xffffffffffffffff, 0x4b45, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000011000)={0x0, 0x0, 0x6d, 0x20000000000014, 0x0, 0x0}, 0x1db) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, 0x0, 0x8000) ioctl$LOOP_SET_STATUS(r1, 0x4c02, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x6, 0x9}, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) mmap$binder(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) [ 3057.142286][ T26] audit: type=1400 audit(1552187251.045:28862): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:31 executing program 5: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'hash\x00', 0x0, 0x0, 'poly1305-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000380)='net/ipv6_route\x00') sendfile(r1, r2, &(0x7f00000002c0)=0xdfffffc, 0xa) [ 3057.295273][ T26] audit: type=1400 audit(1552187251.144:28863): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3057.436924][T25351] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 3057.458916][ T26] audit: type=1400 audit(1552187251.174:28864): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3057.598578][ T26] audit: type=1400 audit(1552187251.184:28865): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3057.621936][ C0] net_ratelimit: 26 callbacks suppressed [ 3057.621945][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3057.622004][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3057.693133][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3057.698993][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3057.704848][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3057.710622][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:07:31 executing program 1: mount(0x0, 0x0, &(0x7f0000000080)='sysfs\x00^\xc5\x83\fW\xef\xd8\xa4:\xa0\t\xb5\x12\x04\xdc:\x00\xc2\xa4\xd8j\xd8~*\x86OK\xc0\v\xce\x1b\xdb cr\x13\xb1\xe8\x94\xd1 q_\x9d\xc1\x12[\x04,r&\xeb\x016\xd9b^\xa1\xd23t\xa6`\xfeZ\xc1sr/\xd3g\x01\"\xc8U0%\xa2X9\\\x92QCy\xafr\x13\xd3+\x8d]\x06\xdc\x8f\xbf,\x84\x9e\xd9\xcd\xef\xc7K\x03\xdf\xa9\xcbZ\x90\xb2\x8bK$\xd7\x86,=f\xfc\xa51g\xd5B@5CZ=\xbbv\xc5}0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r2, 0x8001, 0x1e, 0x7fff, 0x9, 0x5}, &(0x7f0000000240)=0x14) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470059ffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 3060.886410][T26150] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 3062.066428][ T26] kauditd_printk_skb: 102 callbacks suppressed [ 3062.066444][ T26] audit: type=1400 audit(1552187256.066:28973): avc: denied { map } for pid=26462 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3062.198238][ T26] audit: type=1400 audit(1552187256.105:28974): avc: denied { map } for pid=26462 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3062.311017][ T26] audit: type=1400 audit(1552187256.105:28975): avc: denied { map } for pid=26462 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3062.440231][ T26] audit: type=1400 audit(1552187256.145:28976): avc: denied { map } for pid=26462 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3062.541129][ T26] audit: type=1400 audit(1552187256.175:28977): avc: denied { map } for pid=26462 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3062.648354][ T26] audit: type=1400 audit(1552187256.205:28978): avc: denied { map } for pid=26462 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:36 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 3062.721276][ T26] audit: type=1400 audit(1552187256.205:28979): avc: denied { search } for pid=26462 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:36 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001800)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 03:07:36 executing program 2: clock_nanosleep(0x0, 0xfffffffffe000003, &(0x7f0000051ff0)={0x2000000000003}, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x1000000000012}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r0 = gettid() mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r0, 0x1000000000013) 03:07:36 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2, 0x2, 0xffe4}}, &(0x7f00000001c0)=""/174, 0xfffe, 0xae, 0x1}, 0x20) 03:07:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfffffff0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) [ 3062.859400][ T26] audit: type=1400 audit(1552187256.284:28980): avc: denied { search } for pid=26462 comm="blkid" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3063.010045][ T26] audit: type=1400 audit(1552187256.294:28981): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:37 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 3063.152237][ T26] audit: type=1400 audit(1552187256.294:28982): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:37 executing program 2: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r0, &(0x7f0000000200)={0x1f, 0x0, {}, 0x0, 0x7fffffff}, 0xe) 03:07:37 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r2, 0x8001, 0x1e, 0x7fff, 0x9, 0x5}, &(0x7f0000000240)=0x14) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470059ffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 03:07:37 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfffffff0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:07:37 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001800)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000540)=""/246, 0x0}) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x0, 0x0) close(r1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000100)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f00000007c0)=ANY=[]) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x0, r1}) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000000)) 03:07:37 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000800)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0105303, &(0x7f0000000480)) [ 3063.901551][ C0] net_ratelimit: 26 callbacks suppressed [ 3063.901560][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3063.913145][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3063.993094][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3063.999321][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3064.006094][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3064.012475][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3064.062821][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3064.068670][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3064.074554][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3064.080411][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:38 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:07:38 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) shutdown(r0, 0x1) 03:07:38 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:07:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 03:07:39 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000001cc0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=@newlink={0x30, 0x10, 0x801, 0xfffffff0, 0x0, {}, [@IFLA_TXQLEN={0x8}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 03:07:39 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r2, 0x8001, 0x1e, 0x7fff, 0x9, 0x5}, &(0x7f0000000240)=0x14) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470059ffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 03:07:39 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'skcipher\x00', 0x0, 0x0, 'cfb(anubis-generic)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000003900)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/70, 0x46}], 0x1}}, {{0x0, 0x0, &(0x7f0000000a00)=[{&(0x7f0000000800)=""/212, 0xd4}, {&(0x7f0000000900)=""/195, 0xc3}], 0x2}}], 0x2, 0x0, 0x0) 03:07:39 executing program 0: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) 03:07:39 executing program 1: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4e22, 0x0, @ipv4={[], [], @multicast1}}, 0x1c) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000280)=0xff, 0x4) sendmmsg(r0, &(0x7f00000002c0), 0x4000000000000ce, 0x0) [ 3065.968230][T27208] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 03:07:40 executing program 5: creat(&(0x7f0000000040)='./bus\x00', 0x0) iopl(0x2) open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r0 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$P9_RREMOVE(r0, &(0x7f0000000280)={0x7}, 0xff7f) epoll_create1(0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$sg(&(0x7f0000000100)='/dev/sg#\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000d08ff7)='/dev/sg#\x00', 0x0, 0x81) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, 0x0) r4 = gettid() getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000400)={{{@in=@multicast1, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast2}}, &(0x7f0000000280)=0xe8) ioprio_get$uid(0x0, r5) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) socket$inet6_udplite(0xa, 0x2, 0x88) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r4, 0x1004000000016) close(r3) ioctl$VIDIOC_S_DV_TIMINGS(0xffffffffffffffff, 0xc0845657, &(0x7f00000001c0)={0x0, @reserved}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580), &(0x7f0000000600)=0xc) fcntl$F_GET_RW_HINT(r2, 0x40b, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r0, r0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) timer_delete(r6) 03:07:41 executing program 2: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$RNDADDENTROPY(r0, 0x5207, 0x0) [ 3067.113915][ T26] kauditd_printk_skb: 98 callbacks suppressed [ 3067.113930][ T26] audit: type=1400 audit(1552187261.076:29081): avc: denied { map } for pid=27292 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3067.323385][ T26] audit: type=1400 audit(1552187261.096:29082): avc: denied { map } for pid=27285 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3067.503192][ T26] audit: type=1400 audit(1552187261.116:29083): avc: denied { map } for pid=27271 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:41 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000100)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f00000001c0)=0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000200)={r2, 0x8001, 0x1e, 0x7fff, 0x9, 0x5}, &(0x7f0000000240)=0x14) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socket$inet6_sctp(0xa, 0x1, 0x84) r3 = socket$netlink(0x10, 0x3, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560a84470059ffe0064e230f00000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) [ 3067.702058][ T26] audit: type=1400 audit(1552187261.146:29084): avc: denied { map } for pid=27292 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000080)={0x30, 0x3, 0x0, {0x1, 0xf, 0x8, 'selinuxcpuset!\xf9'}}, 0x30) [ 3067.904632][ T26] audit: type=1400 audit(1552187261.156:29086): avc: denied { map } for pid=27285 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:42 executing program 0: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000040)="2400000052001f001515f407000904ff0a00072207000100ffffffff0800e5ff00000006", 0x24) 03:07:42 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x5603, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='scalable\x00', 0x9) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180), 0x0, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) [ 3068.096416][ T26] audit: type=1400 audit(1552187261.166:29087): avc: denied { map } for pid=27271 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.234745][ T26] audit: type=1400 audit(1552187261.156:29085): avc: denied { map } for pid=27292 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.404438][ T26] audit: type=1400 audit(1552187261.166:29088): avc: denied { map } for pid=27285 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.537791][ T26] audit: type=1400 audit(1552187261.185:29089): avc: denied { map } for pid=27295 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2503 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3068.660174][ T26] audit: type=1400 audit(1552187261.195:29090): avc: denied { map } for pid=27271 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:42 executing program 2: r0 = socket$inet(0x2, 0x3, 0x18) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)={@multicast2, @local, 0x1, 0x2, [@rand_addr, @multicast1]}, 0x18) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local}, 0x10) 03:07:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 03:07:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000300)={{0x0, 0x0, r1}}) 03:07:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 03:07:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x18) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)={@multicast2, @local, 0x1, 0x2, [@rand_addr, @multicast1]}, 0x18) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local}, 0x10) 03:07:43 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='\x00\xac=\x9d\xd2\xdb\xe6\xbf\xb4\b\xedcJ\x8e\x84\xd4N\x12\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\xc1\x0f', 0x0) fallocate(r0, 0x0, 0x2000427, 0x40) write(r0, &(0x7f0000002000)='/', 0x1) sendfile(r0, r0, &(0x7f0000000140), 0xfec) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x4, 0x11, r0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000100)='./file1\x00') 03:07:43 executing program 3: syz_open_dev$ndb(&(0x7f0000000000)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg(r1, &(0x7f0000007f00)=[{{&(0x7f00000056c0)=@can={0x1d, 0x0, 0x0, 0xc0ff7f}, 0x3000, &(0x7f00000000c0)}}, {{&(0x7f0000005900)=@pppoe={0x18, 0x0, {0x0, @link_local, 'syzkaller0\x00'}}, 0x80, &(0x7f0000007ac0), 0x73, &(0x7f0000007b00)}}], 0x3fffffffffffe0d, 0x0) recvmsg(r0, &(0x7f0000001840)={&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @remote}, 0x80, &(0x7f0000001700)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/197, 0xc5}, {&(0x7f0000001400)=""/68, 0x44}, {&(0x7f0000001480)=""/208, 0xd0}, {&(0x7f0000001580)=""/106, 0x6a}, {&(0x7f0000001600)=""/98, 0x62}, {&(0x7f0000001680)=""/103, 0x67}], 0x7, &(0x7f0000001780)=""/190, 0xbe}, 0x2000) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1000, &(0x7f0000000140)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@msize={'msize', 0x3d, 0x8}}, {@mmap='mmap'}, {@fscache='fscache'}, {@debug={'debug', 0x3d, 0xb7}}, {@version_9p2000='version=9p2000'}, {@version_9p2000='version=9p2000'}, {@access_any='access=any'}, {@access_client='access=client'}], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, 0x1ff) 03:07:43 executing program 0: mknod$loop(0x0, 0x0, 0x1) r0 = socket(0x1e, 0x4, 0x0) r1 = socket(0x1e, 0x4, 0x0) setxattr$security_smack_transmute(0x0, &(0x7f0000000300)='security.SMACK64TRANSMUTE\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) sendmmsg(r0, &(0x7f0000000a40), 0x8000000000000b0, 0x0) r2 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000001240)="2e0000002a00815fe45ac1", 0xb}], 0x1}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000c34000/0x1000)=nil}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) mlock2(&(0x7f0000b59000/0x3000)=nil, 0x3000, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000180)='security.SMACK64\x00', 0x0, 0x0, 0x2) 03:07:43 executing program 2: r0 = socket$inet(0x2, 0x3, 0x18) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)={@multicast2, @local, 0x1, 0x2, [@rand_addr, @multicast1]}, 0x18) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local}, 0x10) 03:07:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) [ 3070.200683][ C0] net_ratelimit: 26 callbacks suppressed [ 3070.200693][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3070.212195][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:07:44 executing program 2: r0 = socket$inet(0x2, 0x3, 0x18) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1}}, {{@in6}, 0x0, @in6=@loopback}}, 0xe8) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000240)={@multicast2, @local, 0x1, 0x2, [@rand_addr, @multicast1]}, 0x18) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @local}, 0x10) [ 3070.271209][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3070.277019][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3070.282893][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3070.288677][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3070.351865][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3070.357777][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3070.363687][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3070.369467][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 03:07:44 executing program 5: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000780), 0x0, 0x0) setreuid(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) ptrace$pokeuser(0x6, 0x0, 0x2, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r1, 0x8990, &(0x7f0000000140)={'bond0\x00@@\xea\xff\xff\x80\x00\x00\x02\x00', @ifru_names='bond_slave_1\x00'}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, 0x0, 0xffffffffffffff7c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) userfaultfd(0x800) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@initdev, @in6=@mcast1, 0x0, 0x6, 0x0, 0x0, 0x2, 0x20, 0x20, 0x1d}, {0x0, 0x9, 0x2, 0x0, 0x6, 0x0, 0x10001, 0x6}, {0x0, 0x0, 0x0, 0x1}}, {{}, 0x2, @in6=@rand_addr="5a67384dfb89d45542b2e9f156ebbce3", 0x0, 0x3, 0x0, 0x426, 0x0, 0x0, 0x8000}}, 0xe8) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) fallocate(r2, 0x0, 0x0, 0x0) 03:07:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:45 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0}) 03:07:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) [ 3071.303958][T28351] bond0: Error: Device is in use and cannot be enslaved 03:07:45 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="0adc1f123c123f3188") r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) mount$9p_virtio(&(0x7f00000000c0)='nodevvmnet0\\],wlan1em1\x00', &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='9p\x00', 0x0, &(0x7f0000000540)={'trans=virtio,', {[{@cache_loose='cache=loose'}, {@fscache='fscache'}, {@access_user='access=user'}, {@afid={'afid', 0x3d, 0x43d}}, {@access_user='access=user'}, {@cachetag={'cachetag', 0x3d, '!wlan0,wlan0security'}}], [{@smackfsdef={'smackfsdef', 0x3d, 'skcipher\x00'}}]}}) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, &(0x7f0000000000), 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fcntl$setstatus(r3, 0x4, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, &(0x7f0000000040), 0x10000000000443) perf_event_open$cgroup(&(0x7f0000000200)={0x3, 0x70, 0x5, 0x0, 0xffffffffffff7fff, 0x8, 0x0, 0x1, 0x10, 0x2, 0x5, 0x40, 0x9, 0x7, 0x1, 0x7fff, 0x80000000, 0x40, 0x7, 0xfffffffffffff5d1, 0x200, 0x8, 0x9, 0x5, 0x0, 0x1ff, 0x3f, 0x3, 0x9, 0x8, 0x8, 0x7, 0xb90f, 0x3, 0x1, 0x8, 0x8, 0x4, 0x0, 0x4, 0x4, @perf_config_ext={0x4, 0x3}, 0x4, 0x7, 0x4, 0x1, 0x5, 0x0, 0x80}, r4, 0x2, r1, 0x2) writev(r3, &(0x7f00000006c0)=[{&(0x7f0000000600), 0x60020}], 0x1) read(r3, &(0x7f00000003c0)=""/72, 0x100000104) sendmsg$xdp(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000180)="9d", 0x1}], 0x1}, 0x0) 03:07:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="0a0743cc05e381e5b3b60ced5c54dbb7", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmmsg$alg(r1, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x2a0, &(0x7f0000000080)=[@op={0x18, 0x117, 0x2}], 0x18}], 0x4924944, 0x0) 03:07:45 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setfsuid(0x0) mq_notify(0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000380)='/dev/video1\x00', 0x2, 0x0) syz_open_dev$vcsa(0x0, 0x0, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x1, 0x2) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) ioctl$int_in(r2, 0x800000c004500a, &(0x7f0000000040)=0x80000002) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f00000000c0)={0xffffffffffffffd3, 0x34, 0x100000000000000}, 0xfffffefd) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) connect$can_bcm(r0, &(0x7f0000002100), 0x10) 03:07:45 executing program 5: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) [ 3072.171809][ T26] kauditd_printk_skb: 105 callbacks suppressed [ 3072.171824][ T26] audit: type=1400 audit(1552187266.097:29196): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3072.335527][ T26] audit: type=1400 audit(1552187266.156:29197): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() open(0x0, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x400002) r0 = socket$inet_tcp(0x2, 0x1, 0x0) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000300)='ceph\x00', 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000240)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) write$binfmt_aout(r0, &(0x7f0000000040)=ANY=[@ANYRESOCT], 0x337) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000100)={r0, r1}) recvmmsg(r2, &(0x7f0000002300)=[{{0x0, 0xfffffe19, 0x0, 0x0, 0x0, 0x7e}}], 0x2fd, 0x400002fd, 0x0) [ 3072.510936][ T26] audit: type=1400 audit(1552187266.176:29198): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:46 executing program 5: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000b, 0x13, r0, 0x0) madvise(&(0x7f0000836000/0x400000)=nil, 0x400000, 0x2) r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x2f, &(0x7f0000000000), 0x20a154cc) 03:07:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 3073.135587][ T26] audit: type=1400 audit(1552187267.039:29199): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3073.306148][ T26] audit: type=1400 audit(1552187267.039:29200): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:47 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000240)=""/4096) [ 3073.456107][ T26] audit: type=1400 audit(1552187267.079:29201): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:47 executing program 3: bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000980)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'bpq0\x00', 0x21}) mkdir(0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x2e) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2, 0x0, 0x0) ioprio_get$pid(0x8000000000001, 0x0) socket$isdn_base(0x22, 0x3, 0x0) setxattr$trusted_overlay_upper(0x0, &(0x7f0000000240)='trusted.overlay.upper\x00', &(0x7f0000000500)=ANY=[], 0x0, 0x2) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000880)={0xffffffffffffffff}) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f00000002c0)=@req3={0x2, 0x3, 0x7ff, 0x5, 0x1, 0x1f}, 0x1c) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') setsockopt$bt_rfcomm_RFCOMM_LM(0xffffffffffffffff, 0x12, 0x3, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000480)="9ae6aae906713427a13d16485f235bb99ad78d66d07b52845b489be831113b1fda9e579b83968128fe8dbe7532ba9a6335a0e75406000000bdca2f4639462730056c9dc7b3dbfb12e201b58b8505c541200cdc01aef174") [ 3073.608832][ T26] audit: type=1400 audit(1552187267.079:29202): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 3073.754129][ T26] audit: type=1400 audit(1552187267.089:29203): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3073.841693][ T26] audit: type=1400 audit(1552187267.089:29204): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) [ 3073.986851][ T26] audit: type=1400 audit(1552187267.129:29205): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:48 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:48 executing program 1: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @time, {0xffffffffffffff81, 0x8}, {}, @raw32}], 0x30) 03:07:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:49 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:49 executing program 1: r0 = socket(0xa, 0x1, 0x0) fstat(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) r2 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x0, 0x0) setresuid(0x0, r3, 0x0) shmget$private(0x0, 0x4000, 0x1808, &(0x7f0000ffb000/0x4000)=nil) 03:07:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = socket$inet6(0xa, 0x2000000000000001, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x9) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000100)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 03:07:49 executing program 3: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0x1}}, 0x0) r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x1, 0x0) ioctl(r0, 0xffffffffffffffc6, &(0x7f0000000040)) 03:07:49 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x0, 0x0) read(r0, 0x0, 0x0) 03:07:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ad7000)={0x1, &(0x7f0000acbff8)=[{0x6, 0x0, 0x0, 0x6}]}, 0x10) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x4e22, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000000400)="99", 0x1, 0x1, 0x0, 0x0) sendto$inet6(r0, &(0x7f00000003c0)="c7", 0x1, 0x1, 0x0, 0x0) 03:07:50 executing program 2: r0 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r0, 0x0, 0xcb, &(0x7f0000000000), 0x10) [ 3076.479664][ C0] net_ratelimit: 26 callbacks suppressed [ 3076.479673][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3076.491199][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3076.570382][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3076.576234][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3076.582093][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3076.587855][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3076.640960][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3076.646824][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3076.652789][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3076.659125][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:50 executing program 5: r0 = syz_open_dev$sndseq(&(0x7f0000000340)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000240)={{0x80}, 'port0\x00'}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000040)={{}, {0x80}}) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f00000001c0)={{}, {0x1000400080}, 0x0, 0xfffffffffffffffe}) 03:07:50 executing program 0: syz_open_procfs(0x0, &(0x7f0000000100)='ne\xe8x\x10\xac@)PJ') r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, 0x0, 0x0) lstat(0x0, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$security_selinux(&(0x7f0000000280)='.//ile0\x00', &(0x7f0000000440)='security.selinux\x00', 0x0, 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 03:07:50 executing program 4: socketpair$unix(0x1, 0x200000000002, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000000080)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)='X', 0x1, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f0000000700)="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", 0x801) keyctl$dh_compute(0x17, &(0x7f0000000540)={r2, r1, r1}, 0x0, 0x0, 0x0) [ 3077.222676][ T26] kauditd_printk_skb: 97 callbacks suppressed [ 3077.222702][ T26] audit: type=1400 audit(1552187271.107:29303): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3077.365470][ T26] audit: type=1400 audit(1552187271.147:29304): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3077.478710][ T26] audit: type=1400 audit(1552187271.167:29305): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:51 executing program 1: socket$vsock_stream(0x28, 0x1, 0x0) creat(&(0x7f0000000400)='./file0\x00', 0x0) pipe(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xffffffea) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$FUSE_ENTRY(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f0000000440)) clock_nanosleep(0x0, 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, &(0x7f00000007c0)) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f00000004c0)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:07:51 executing program 5: r0 = socket$inet(0x2, 0x3, 0xfffffffffffffffd) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0), 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'veth1_to_team\x00', 0x8}, 0x18) setsockopt$X25_QBITINCL(0xffffffffffffffff, 0x106, 0x1, 0x0, 0x0) ioctl(r1, 0x8916, &(0x7f0000000000)) ioctl(r1, 0x8936, &(0x7f0000000000)) bind$x25(r1, &(0x7f0000000040)={0x9, @remote={[], 0x3}}, 0x12) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) [ 3077.564682][T30422] MPI: mpi too large (16392 bits) [ 3077.592695][ T26] audit: type=1400 audit(1552187271.167:29306): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:51 executing program 2: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000000100)=0x1, 0xfb) setsockopt$inet_tcp_int(r1, 0x6, 0x14, &(0x7f0000788ffc)=0x100000001, 0xfdf6) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) sendto$inet(r1, &(0x7f0000000000), 0xffffffffffffff5d, 0x0, 0x0, 0x0) splice(r1, 0x0, r0, 0x0, 0x1ff, 0x0) [ 3077.699469][ T26] audit: type=1400 audit(1552187271.167:29307): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3077.820605][ T26] audit: type=1400 audit(1552187271.187:29308): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3077.938798][ T26] audit: type=1400 audit(1552187271.197:29309): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:51 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x101006, 0x0) r1 = memfd_create(&(0x7f00000001c0)=')\\\x10X\x80\xa9\xbf\x8c\x9b\xd4s!\x14\xb0p.\\O\x90]\xd7\xdf\x943\xd8\xad\x12W\x9fZ~\x9e\xf3\x84/\xe4\x19\xe5=\xde\x8e\x91\xd3D\x99\x90\xf6U\xfe\x87\xe7\xd7\xccN<\xc6\xbb\x93\xb3\xf7\xcb7\xb7\t\xf4p #U\xf9:\x8c\xa1F\xd2\xa6p5\x804Y~\xc9\x19\x03R\xb8L\xef\xd0\x84f\xbe\'\xf2\xf9W3b\x9c\x1d)\xcc?7\xe9\xad\x16\xa0a\xab\xfb)\x0e\x10\xcb\n{\"\xecD\xfa\xdeuC\x86\x92\xad\xef\"3H\x89\x94\xcc\xed\xe3\xef\a\xe7\x106\xfd\xd1\xcfq\x02\xfe{R46g\xee\xa4\xb6\xe9w\xe9\x15c6\xac\xa6\xe8\x8fV\xa2V\xba\x7fa\xb2\xc9$V\xcd\x81\x1aI\xd8\xc4\x0e\xad\x9f|\x1c\xf9\x92\xf8j\x1b\xb1x\x9a\x93?\t', 0x0) write$binfmt_aout(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="3f1802ad0003ed5c26d3b0a2088a03"], 0xf) sendfile(r0, r1, &(0x7f0000000000), 0x7fffffffffffffff) [ 3078.063752][ T26] audit: type=1400 audit(1552187271.365:29310): avc: denied { map } for pid=30222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000001c0)='devtmpfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/186, 0x4a9e280) 03:07:52 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x4000000000084) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f3188b070") sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0xc100) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="ba02000000000000001c857b01adc2f2", 0x10}], 0x1}, 0x0) [ 3078.155374][ T26] audit: type=1400 audit(1552187271.365:29311): avc: denied { map } for pid=30222 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 3078.283823][ T26] audit: type=1400 audit(1552187271.365:29312): avc: denied { map } for pid=30222 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 03:07:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f123c123f3188b070") r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000100), 0x0) 03:07:52 executing program 2: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, &(0x7f0000000200)) 03:07:52 executing program 1: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) socket$kcm(0xa, 0x0, 0x73) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(0xffffffffffffffff, 0x4004ae8b, &(0x7f0000001000)=ANY=[@ANYBLOB="cd9d"]) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000440)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x2000, &(0x7f0000001000/0x2000)=nil}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 03:07:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) fallocate(r1, 0x11, 0x0, 0x10000) write$P9_RREADDIR(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="db"], 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)) 03:07:53 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/112, 0x70) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 03:07:53 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) getrusage(0x1, &(0x7f0000000040)) 03:07:53 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="24000000170a070c1dfffd946fa2830020200a0003000200001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) 03:07:53 executing program 1: getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) creat(0x0, 0x80) chdir(0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f00000004c0)='./file0\x00', 0xe000, 0x1, &(0x7f00000002c0)=[{&(0x7f0000000140)="eb3c906d6b66732e6661740002047e0002000270f7f8", 0x16}], 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) umount2(&(0x7f0000000280)='./file0\x00', 0x0) 03:07:53 executing program 3: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x11, &(0x7f0000000040)={r1}, 0x8) [ 3079.903224][T31491] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 03:07:53 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800813ee45ae087185082cf0324b0eba06ec4000023000000000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) 03:07:53 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) fallocate(r1, 0x11, 0x0, 0x10000) write$P9_RREADDIR(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="db"], 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)) 03:07:53 executing program 5: syz_open_dev$video(0x0, 0x0, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYRESHEX], 0x480c0908) bind$alg(r2, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha384-avx\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r1, &(0x7f0000000340)={0x1, 0x10, 0xfa00, {0x0}}, 0x18) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r4, 0x0, 0x200000, 0x0) [ 3080.680688][T31704] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.0'. 03:07:54 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x500}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='xfs\x00', 0x198, 0x0) 03:07:54 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/112, 0x70) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 03:07:54 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) fallocate(r1, 0x11, 0x0, 0x10000) write$P9_RREADDIR(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="db"], 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)) 03:07:55 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/112, 0x70) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 03:07:55 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="2bda54090000005c07"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(r2, &(0x7f0000000740)=""/4096, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x0, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x7, 0x100019) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) r6 = msgget(0x3, 0x210) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000002000)=""/4096) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f00000003c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5}, 0x48) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) sendto(r4, &(0x7f0000000300)="2d7fd008414633df02d263739023a7d6bac7944fb5ca7b268ebaf4296ef255970e5ac93b0fcf000cceb5d6431eec7165eacbd933e5f48993a29646860cf880c647db1ba80da400f74c3ca83385a7", 0x4e, 0x4000000, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000004000)={'filter\x00', 0x7, 0x4, 0x558, 0x218, 0x0, 0x218, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@remote, @dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, @mac, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x1d}, {[0x0, 0x0, 0x0, 0xff]}, 0x1, 0x80, 0x0, 0x8, 0x0, 0x96e8, 'lo\x00', 'team_slave_1\x00', {}, {0xff}}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:udev_helper_exec_t:s0\x00'}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@multicast1, @loopback, 0xffffff00, 0x0, @empty, {[0x0, 0xff]}, @empty, {[0xff, 0xff]}, 0x8001, 0x1, 0x5, 0x0, 0x0, 0xd7c, 'ip6gretap0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x21}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @empty, 0x0, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f00000000c0)) 03:07:55 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x500}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='xfs\x00', 0x198, 0x0) 03:07:55 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x4, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)={0xa}) 03:07:55 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40c2, 0x0) r2 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) fallocate(r1, 0x11, 0x0, 0x10000) write$P9_RREADDIR(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="db"], 0x1) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f00000001c0)) 03:07:56 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/112, 0x70) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 03:07:56 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/112, 0x70) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) 03:07:56 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x500}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='xfs\x00', 0x198, 0x0) [ 3082.768718][ C0] net_ratelimit: 26 callbacks suppressed [ 3082.768727][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3082.780249][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3082.812126][ T26] kauditd_printk_skb: 151 callbacks suppressed [ 3082.812141][ T26] audit: type=1800 audit(1552187276.654:29464): pid=32350 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=16684 res=0 [ 3082.849332][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3082.855173][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:07:56 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf6\x17s\'C\xe3\x97\xb8\x9f&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$UHID_GET_REPORT_REPLY(r1, &(0x7f0000000440)={0xa, 0x4, 0x6}, 0xa) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7fffff, 0x12, r1, 0x0) ioctl$FS_IOC_GETFLAGS(r1, 0xc020660b, &(0x7f0000000000)) [ 3082.861062][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3082.866833][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:07:56 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="2bda54090000005c07"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(r2, &(0x7f0000000740)=""/4096, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x0, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x7, 0x100019) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) r6 = msgget(0x3, 0x210) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000002000)=""/4096) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f00000003c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5}, 0x48) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) sendto(r4, &(0x7f0000000300)="2d7fd008414633df02d263739023a7d6bac7944fb5ca7b268ebaf4296ef255970e5ac93b0fcf000cceb5d6431eec7165eacbd933e5f48993a29646860cf880c647db1ba80da400f74c3ca83385a7", 0x4e, 0x4000000, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000004000)={'filter\x00', 0x7, 0x4, 0x558, 0x218, 0x0, 0x218, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@remote, @dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, @mac, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x1d}, {[0x0, 0x0, 0x0, 0xff]}, 0x1, 0x80, 0x0, 0x8, 0x0, 0x96e8, 'lo\x00', 'team_slave_1\x00', {}, {0xff}}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:udev_helper_exec_t:s0\x00'}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@multicast1, @loopback, 0xffffff00, 0x0, @empty, {[0x0, 0xff]}, @empty, {[0xff, 0xff]}, 0x8001, 0x1, 0x5, 0x0, 0x0, 0xd7c, 'ip6gretap0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x21}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @empty, 0x0, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f00000000c0)) [ 3082.930014][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3082.935820][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3082.941734][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3082.947519][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:07:57 executing program 1: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0xffffffffffffffff) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0, 0x500}, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='xfs\x00', 0x198, 0x0) [ 3083.321154][ T26] audit: type=1400 audit(1552187277.150:29465): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:57 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="2bda54090000005c07"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(r2, &(0x7f0000000740)=""/4096, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x0, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x7, 0x100019) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) r6 = msgget(0x3, 0x210) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000002000)=""/4096) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f00000003c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5}, 0x48) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) sendto(r4, &(0x7f0000000300)="2d7fd008414633df02d263739023a7d6bac7944fb5ca7b268ebaf4296ef255970e5ac93b0fcf000cceb5d6431eec7165eacbd933e5f48993a29646860cf880c647db1ba80da400f74c3ca83385a7", 0x4e, 0x4000000, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000004000)={'filter\x00', 0x7, 0x4, 0x558, 0x218, 0x0, 0x218, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@remote, @dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, @mac, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x1d}, {[0x0, 0x0, 0x0, 0xff]}, 0x1, 0x80, 0x0, 0x8, 0x0, 0x96e8, 'lo\x00', 'team_slave_1\x00', {}, {0xff}}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:udev_helper_exec_t:s0\x00'}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@multicast1, @loopback, 0xffffff00, 0x0, @empty, {[0x0, 0xff]}, @empty, {[0xff, 0xff]}, 0x8001, 0x1, 0x5, 0x0, 0x0, 0xd7c, 'ip6gretap0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x21}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @empty, 0x0, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f00000000c0)) [ 3083.418369][ T26] audit: type=1400 audit(1552187277.170:29466): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:57 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/112, 0x70) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) [ 3083.538501][ T26] audit: type=1400 audit(1552187277.190:29467): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3083.678932][ T26] audit: type=1400 audit(1552187277.210:29468): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3083.829537][ T26] audit: type=1400 audit(1552187277.219:29469): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3083.951407][ T26] audit: type=1400 audit(1552187277.259:29470): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:57 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) r1 = epoll_create(0x100000001) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffff9c, 0xc0086426, &(0x7f00000002c0)={0x1, &(0x7f0000000280)=[{}]}) prctl$PR_SET_PTRACER(0x59616d61, 0x0) r3 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x3, 0x2) clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, @perf_config_ext, 0x4000200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x28) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000015bffc)='nfs\x00', 0x0, &(0x7f0000000000)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = syz_open_procfs(0x0, &(0x7f0000000100)='map_files\x00') getdents64(r4, &(0x7f0000000000)=""/112, 0x70) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, 0x0, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) [ 3084.065172][ T26] audit: type=1400 audit(1552187277.259:29471): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:58 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="2bda54090000005c07"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(r2, &(0x7f0000000740)=""/4096, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x0, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x7, 0x100019) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) r6 = msgget(0x3, 0x210) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000002000)=""/4096) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f00000003c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5}, 0x48) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) sendto(r4, &(0x7f0000000300)="2d7fd008414633df02d263739023a7d6bac7944fb5ca7b268ebaf4296ef255970e5ac93b0fcf000cceb5d6431eec7165eacbd933e5f48993a29646860cf880c647db1ba80da400f74c3ca83385a7", 0x4e, 0x4000000, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000004000)={'filter\x00', 0x7, 0x4, 0x558, 0x218, 0x0, 0x218, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@remote, @dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, @mac, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x1d}, {[0x0, 0x0, 0x0, 0xff]}, 0x1, 0x80, 0x0, 0x8, 0x0, 0x96e8, 'lo\x00', 'team_slave_1\x00', {}, {0xff}}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:udev_helper_exec_t:s0\x00'}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@multicast1, @loopback, 0xffffff00, 0x0, @empty, {[0x0, 0xff]}, @empty, {[0xff, 0xff]}, 0x8001, 0x1, 0x5, 0x0, 0x0, 0xd7c, 'ip6gretap0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x21}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @empty, 0x0, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f00000000c0)) [ 3084.179415][ T26] audit: type=1400 audit(1552187277.338:29472): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:58 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="2bda54090000005c07"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(r2, &(0x7f0000000740)=""/4096, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x0, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x7, 0x100019) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) r6 = msgget(0x3, 0x210) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000002000)=""/4096) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f00000003c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5}, 0x48) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) sendto(r4, &(0x7f0000000300)="2d7fd008414633df02d263739023a7d6bac7944fb5ca7b268ebaf4296ef255970e5ac93b0fcf000cceb5d6431eec7165eacbd933e5f48993a29646860cf880c647db1ba80da400f74c3ca83385a7", 0x4e, 0x4000000, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000004000)={'filter\x00', 0x7, 0x4, 0x558, 0x218, 0x0, 0x218, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@remote, @dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, @mac, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x1d}, {[0x0, 0x0, 0x0, 0xff]}, 0x1, 0x80, 0x0, 0x8, 0x0, 0x96e8, 'lo\x00', 'team_slave_1\x00', {}, {0xff}}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:udev_helper_exec_t:s0\x00'}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@multicast1, @loopback, 0xffffff00, 0x0, @empty, {[0x0, 0xff]}, @empty, {[0xff, 0xff]}, 0x8001, 0x1, 0x5, 0x0, 0x0, 0xd7c, 'ip6gretap0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x21}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @empty, 0x0, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f00000000c0)) [ 3084.317989][ T26] audit: type=1400 audit(1552187277.388:29473): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:07:58 executing program 1: r0 = socket$inet(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000340)="240000002c0007031dfffd946f610500000000000500000000000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000007000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) 03:07:58 executing program 5: openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x80000802, 0x0) syz_open_dev$rtc(0x0, 0x0, 0x200000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) clone(0x4841ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x7) socket$inet_tcp(0x2, 0x1, 0x0) r2 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f00000001c0)={{0x0, 0x1}}) [ 3085.008035][ T539] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. 03:07:58 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0x40186f40, &(0x7f00000003c0)={0x0, 0xfffffffffffffffc, 0x0, [], 0x0}) 03:07:59 executing program 0: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="2bda54090000005c07"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(r2, &(0x7f0000000740)=""/4096, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x0, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x7, 0x100019) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) r6 = msgget(0x3, 0x210) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000002000)=""/4096) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f00000003c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5}, 0x48) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) sendto(r4, &(0x7f0000000300)="2d7fd008414633df02d263739023a7d6bac7944fb5ca7b268ebaf4296ef255970e5ac93b0fcf000cceb5d6431eec7165eacbd933e5f48993a29646860cf880c647db1ba80da400f74c3ca83385a7", 0x4e, 0x4000000, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000004000)={'filter\x00', 0x7, 0x4, 0x558, 0x218, 0x0, 0x218, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@remote, @dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, @mac, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x1d}, {[0x0, 0x0, 0x0, 0xff]}, 0x1, 0x80, 0x0, 0x8, 0x0, 0x96e8, 'lo\x00', 'team_slave_1\x00', {}, {0xff}}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:udev_helper_exec_t:s0\x00'}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@multicast1, @loopback, 0xffffff00, 0x0, @empty, {[0x0, 0xff]}, @empty, {[0xff, 0xff]}, 0x8001, 0x1, 0x5, 0x0, 0x0, 0xd7c, 'ip6gretap0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x21}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @empty, 0x0, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f00000000c0)) 03:07:59 executing program 4: perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="2bda54090000005c07"], 0x0}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x20000, 0x0) getdents64(r2, &(0x7f0000000740)=""/4096, 0x1000) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) fadvise64(r1, 0x0, 0x3, 0x4) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x856, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet(0x2, 0x7, 0x100019) connect$inet(r4, &(0x7f00000002c0)={0x2, 0x4e22, @local}, 0x5) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x23, &(0x7f0000000000)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, {0x0, 0x0, 0x59b, 0x0, 0x0, 0x0, 0x8000000000000}, {0x100}}, {{@in6}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0xe8) r5 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000200)) r6 = msgget(0x3, 0x210) msgctl$IPC_INFO(r6, 0x3, &(0x7f0000002000)=""/4096) setsockopt$inet_tcp_int(r5, 0x6, 0x10000000013, &(0x7f0000000100), 0xfb) setsockopt$inet_tcp_int(r5, 0x6, 0x0, 0x0, 0x0) bind$inet(r5, &(0x7f0000738ff0)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r5, &(0x7f00000003c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r5, 0x1) setuid(r3) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x0, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x5}, 0x48) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) sendto(r4, &(0x7f0000000300)="2d7fd008414633df02d263739023a7d6bac7944fb5ca7b268ebaf4296ef255970e5ac93b0fcf000cceb5d6431eec7165eacbd933e5f48993a29646860cf880c647db1ba80da400f74c3ca83385a7", 0x4e, 0x4000000, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000004000)={'filter\x00', 0x7, 0x4, 0x558, 0x218, 0x0, 0x218, 0x470, 0x470, 0x470, 0x4, 0x0, {[{{@arp={@remote, @dev={0xac, 0x14, 0x14, 0xd}, 0x0, 0x0, @mac, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}, @mac=@dev={[], 0x1d}, {[0x0, 0x0, 0x0, 0xff]}, 0x1, 0x80, 0x0, 0x8, 0x0, 0x96e8, 'lo\x00', 'team_slave_1\x00', {}, {0xff}}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:udev_helper_exec_t:s0\x00'}}}, {{@uncond, 0xf0, 0x118}, @unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@arp={@multicast1, @loopback, 0xffffff00, 0x0, @empty, {[0x0, 0xff]}, @empty, {[0xff, 0xff]}, 0x8001, 0x1, 0x5, 0x0, 0x0, 0xd7c, 'ip6gretap0\x00', 'vlan0\x00', {0xff}, {0xff}, 0x0, 0x21}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac, @local, @empty, 0x0, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x5a8) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, &(0x7f00000000c0)) 03:07:59 executing program 2: socketpair$unix(0x1, 0x803, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) connect$unix(r0, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) 03:07:59 executing program 1: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, &(0x7f0000000000), &(0x7f0000048000), 0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x3, 0x32, 0xffffffffffffffff, 0x0) exit(0x0) 03:07:59 executing program 5: mkdir(0x0, 0x0) mkdir(0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0x481, 0x80) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x208001, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000740)={0x0, 0x0, 0x587602a5, 0x0, [], [], [], 0x0, 0x9, 0x0, 0xd4e1, "9acbda68b9e6eaf201883ed741b93e44"}) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x8020, 0x0) 03:07:59 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000000a000)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x8000000200000000, 0x800007f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, &(0x7f0000000100)=""/76) lsetxattr$security_ima(&(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x2) openat$sequencer(0xffffffffffffff9c, 0x0, 0x0, 0x0) mq_unlink(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='nfs\x00', 0x0, &(0x7f000000a000)) [ 3086.289219][ T844] [ 3086.291589][ T844] ====================================================== [ 3086.298632][ T844] WARNING: possible circular locking dependency detected [ 3086.305650][ T844] 5.0.0+ #15 Not tainted [ 3086.309885][ T844] ------------------------------------------------------ [ 3086.316898][ T844] syz-executor.2/844 is trying to acquire lock: [ 3086.323129][ T844] 00000000520483ab (rlock-AF_UNIX){+.+.}, at: skb_queue_tail+0x26/0x150 [ 3086.331566][ T844] [ 3086.331566][ T844] but task is already holding lock: [ 3086.338926][ T844] 00000000de9aec21 (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock+0x80/0xb0 [ 3086.348575][ T844] [ 3086.348575][ T844] which lock already depends on the new lock. [ 3086.348575][ T844] [ 3086.359009][ T844] [ 3086.359009][ T844] the existing dependency chain (in reverse order) is: [ 3086.368021][ T844] [ 3086.368021][ T844] -> #1 (&(&u->lock)->rlock/1){+.+.}: [ 3086.375639][ T844] lock_acquire+0x16f/0x3f0 [ 3086.380725][ T844] _raw_spin_lock_nested+0x35/0x50 [ 3086.386372][ T844] sk_diag_fill.isra.0+0x9c0/0xf30 [ 3086.392015][ T844] unix_diag_dump+0x35c/0x550 [ 3086.397277][ T844] netlink_dump+0x55d/0xfb0 [ 3086.402306][ T844] __netlink_dump_start+0x5b4/0x7e0 [ 3086.408035][ T844] unix_diag_handler_dump+0x390/0x740 [ 3086.414000][ T844] sock_diag_rcv_msg+0x322/0x410 [ 3086.419481][ T844] netlink_rcv_skb+0x17a/0x460 [ 3086.424769][ T844] sock_diag_rcv+0x2b/0x40 [ 3086.429716][ T844] netlink_unicast+0x536/0x720 [ 3086.435032][ T844] netlink_sendmsg+0x8ae/0xd70 [ 3086.440387][ T844] sock_sendmsg+0xdd/0x130 [ 3086.445329][ T844] sock_write_iter+0x27c/0x3e0 [ 3086.450655][ T844] do_iter_readv_writev+0x5e1/0x8e0 [ 3086.456384][ T844] do_iter_write+0x184/0x610 [ 3086.461508][ T844] vfs_writev+0x1b3/0x2f0 [ 3086.466377][ T844] do_writev+0xf6/0x290 [ 3086.471053][ T844] __x64_sys_writev+0x75/0xb0 [ 3086.476302][ T844] do_syscall_64+0x103/0x610 [ 3086.481414][ T844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3086.487818][ T844] [ 3086.487818][ T844] -> #0 (rlock-AF_UNIX){+.+.}: [ 3086.494759][ T844] __lock_acquire+0x239c/0x3fb0 [ 3086.500127][ T844] lock_acquire+0x16f/0x3f0 [ 3086.505150][ T844] _raw_spin_lock_irqsave+0x95/0xcd [ 3086.510872][ T844] skb_queue_tail+0x26/0x150 [ 3086.515989][ T844] unix_dgram_sendmsg+0xc31/0x11e0 [ 3086.521629][ T844] sock_sendmsg+0xdd/0x130 [ 3086.526569][ T844] ___sys_sendmsg+0x3e2/0x930 [ 3086.531769][ T844] __sys_sendmmsg+0x1bf/0x4d0 [ 3086.536966][ T844] __x64_sys_sendmmsg+0x9d/0x100 [ 3086.542438][ T844] do_syscall_64+0x103/0x610 [ 3086.547553][ T844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3086.554135][ T844] [ 3086.554135][ T844] other info that might help us debug this: [ 3086.554135][ T844] [ 3086.564357][ T844] Possible unsafe locking scenario: [ 3086.564357][ T844] [ 3086.571804][ T844] CPU0 CPU1 [ 3086.577166][ T844] ---- ---- [ 3086.582522][ T844] lock(&(&u->lock)->rlock/1); [ 3086.587358][ T844] lock(rlock-AF_UNIX); [ 3086.594108][ T844] lock(&(&u->lock)->rlock/1); [ 3086.601470][ T844] lock(rlock-AF_UNIX); [ 3086.605708][ T844] [ 3086.605708][ T844] *** DEADLOCK *** [ 3086.605708][ T844] [ 3086.613871][ T844] 1 lock held by syz-executor.2/844: [ 3086.619145][ T844] #0: 00000000de9aec21 (&(&u->lock)->rlock/1){+.+.}, at: unix_state_double_lock+0x80/0xb0 [ 3086.629135][ T844] [ 3086.629135][ T844] stack backtrace: [ 3086.635034][ T844] CPU: 0 PID: 844 Comm: syz-executor.2 Not tainted 5.0.0+ #15 [ 3086.642493][ T844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3086.652580][ T844] Call Trace: [ 3086.655934][ T844] dump_stack+0x172/0x1f0 [ 3086.660741][ T844] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 3086.666828][ T844] check_prev_add.constprop.0+0xf11/0x23c0 [ 3086.672633][ T844] ? check_usage+0x570/0x570 [ 3086.677214][ T844] ? lock_downgrade+0x880/0x880 [ 3086.682121][ T844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3086.688350][ T844] ? graph_lock+0x7b/0x200 [ 3086.692766][ T844] ? __lockdep_reset_lock+0x450/0x450 [ 3086.698140][ T844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3086.704382][ T844] __lock_acquire+0x239c/0x3fb0 [ 3086.709235][ T844] ? mark_held_locks+0xf0/0xf0 [ 3086.714017][ T844] ? mark_held_locks+0xf0/0xf0 [ 3086.718785][ T844] ? reacquire_held_locks+0xfb/0x520 [ 3086.724079][ T844] ? find_held_lock+0x60/0x130 [ 3086.728854][ T844] lock_acquire+0x16f/0x3f0 [ 3086.733372][ T844] ? skb_queue_tail+0x26/0x150 [ 3086.738140][ T844] _raw_spin_lock_irqsave+0x95/0xcd [ 3086.743347][ T844] ? skb_queue_tail+0x26/0x150 [ 3086.748109][ T844] skb_queue_tail+0x26/0x150 [ 3086.752699][ T844] ? maybe_add_creds+0x44/0x320 [ 3086.757559][ T844] unix_dgram_sendmsg+0xc31/0x11e0 [ 3086.762668][ T844] ? unix_stream_connect+0x1070/0x1070 [ 3086.768184][ T844] ? tomoyo_socket_sendmsg+0x26/0x30 [ 3086.773467][ T844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3086.779745][ T844] ? security_socket_sendmsg+0x93/0xc0 [ 3086.785203][ T844] ? unix_stream_connect+0x1070/0x1070 [ 3086.790666][ T844] sock_sendmsg+0xdd/0x130 [ 3086.795079][ T844] ___sys_sendmsg+0x3e2/0x930 [ 3086.799751][ T844] ? copy_msghdr_from_user+0x430/0x430 [ 3086.805205][ T844] ? __lock_acquire+0x548/0x3fb0 [ 3086.810136][ T844] ? lock_downgrade+0x880/0x880 [ 3086.814977][ T844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3086.821284][ T844] ? kasan_check_read+0x11/0x20 [ 3086.826172][ T844] ? __might_fault+0x12b/0x1e0 [ 3086.830932][ T844] ? find_held_lock+0x35/0x130 [ 3086.835684][ T844] ? __might_fault+0x12b/0x1e0 [ 3086.840445][ T844] ? lock_downgrade+0x880/0x880 [ 3086.845371][ T844] ? ___might_sleep+0x163/0x280 [ 3086.850214][ T844] __sys_sendmmsg+0x1bf/0x4d0 [ 3086.854886][ T844] ? __ia32_sys_sendmsg+0xb0/0xb0 [ 3086.859963][ T844] ? _copy_to_user+0xc9/0x120 [ 3086.864643][ T844] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3086.870924][ T844] ? put_timespec64+0xda/0x140 [ 3086.875681][ T844] ? nsecs_to_jiffies+0x30/0x30 [ 3086.880522][ T844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3086.885978][ T844] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 3086.891446][ T844] ? do_syscall_64+0x26/0x610 [ 3086.896136][ T844] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3086.902204][ T844] ? do_syscall_64+0x26/0x610 [ 3086.906880][ T844] __x64_sys_sendmmsg+0x9d/0x100 [ 3086.911811][ T844] do_syscall_64+0x103/0x610 [ 3086.916393][ T844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3086.922274][ T844] RIP: 0033:0x457f29 [ 3086.926157][ T844] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3086.945774][ T844] RSP: 002b:00007f670cf55c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 3086.954186][ T844] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457f29 [ 3086.962178][ T844] RDX: 0000000000000080 RSI: 00000000200bd000 RDI: 0000000000000004 [ 3086.970141][ T844] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3086.978115][ T844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f670cf566d4 03:08:00 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:00 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x76, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 3086.986073][ T844] R13: 00000000004c4f12 R14: 00000000004d8c70 R15: 00000000ffffffff 03:08:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r1, 0x6, 0xb, 0x0, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0xfffffffffffffe1a, 0x0}, 0x10) 03:08:01 executing program 5: mkdir(0x0, 0x0) mkdir(0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0x481, 0x80) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x208001, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000740)={0x0, 0x0, 0x587602a5, 0x0, [], [], [], 0x0, 0x9, 0x0, 0xd4e1, "9acbda68b9e6eaf201883ed741b93e44"}) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x8020, 0x0) 03:08:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x76, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) [ 3087.449658][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env [ 3087.473943][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:08:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:01 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:01 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x76, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:08:01 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:01 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:01 executing program 5: mkdir(0x0, 0x0) mkdir(0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0x481, 0x80) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x208001, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000740)={0x0, 0x0, 0x587602a5, 0x0, [], [], [], 0x0, 0x9, 0x0, 0xd4e1, "9acbda68b9e6eaf201883ed741b93e44"}) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x8020, 0x0) [ 3088.108293][ T26] kauditd_printk_skb: 94 callbacks suppressed [ 3088.108307][ T26] audit: type=1400 audit(1552187281.903:29568): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3088.158808][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env [ 3088.207936][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:08:02 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r1, 0x6, 0xb, 0x0, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0xfffffffffffffe1a, 0x0}, 0x10) [ 3088.255354][ T26] audit: type=1400 audit(1552187281.942:29569): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3088.354061][ T26] audit: type=1400 audit(1552187281.952:29570): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:08:02 executing program 0: mkdir(0x0, 0x0) mkdir(0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0x481, 0x80) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x208001, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000740)={0x0, 0x0, 0x587602a5, 0x0, [], [], [], 0x0, 0x9, 0x0, 0xd4e1, "9acbda68b9e6eaf201883ed741b93e44"}) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x8020, 0x0) 03:08:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) [ 3088.483288][ T26] audit: type=1400 audit(1552187282.042:29571): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3088.603724][ T26] audit: type=1400 audit(1552187282.042:29572): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3088.727583][ T26] audit: type=1400 audit(1552187282.042:29573): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:08:02 executing program 4: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)={0x1, [0x0]}, &(0x7f000095dffc)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x76, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) 03:08:02 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) 03:08:02 executing program 5: mkdir(0x0, 0x0) mkdir(0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0x481, 0x80) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x208001, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000740)={0x0, 0x0, 0x587602a5, 0x0, [], [], [], 0x0, 0x9, 0x0, 0xd4e1, "9acbda68b9e6eaf201883ed741b93e44"}) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x8020, 0x0) [ 3088.865594][ T26] audit: type=1400 audit(1552187282.042:29574): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3088.914786][ T26] audit: type=1400 audit(1552187282.071:29575): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3088.952786][ T26] audit: type=1400 audit(1552187282.081:29576): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3089.006960][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env [ 3089.031974][ T26] audit: type=1400 audit(1552187282.091:29577): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3089.057762][ C0] net_ratelimit: 26 callbacks suppressed [ 3089.057770][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3089.069231][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3089.089576][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:08:02 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) [ 3089.138382][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3089.144214][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3089.150041][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3089.155794][ C0] protocol 88fb is buggy, dev hsr_slave_1 03:08:03 executing program 0: mkdir(0x0, 0x0) mkdir(0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0x481, 0x80) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x208001, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000740)={0x0, 0x0, 0x587602a5, 0x0, [], [], [], 0x0, 0x9, 0x0, 0xd4e1, "9acbda68b9e6eaf201883ed741b93e44"}) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x8020, 0x0) 03:08:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r1, 0x6, 0xb, 0x0, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0xfffffffffffffe1a, 0x0}, 0x10) [ 3089.219048][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3089.224919][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3089.230758][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3089.236530][ C1] protocol 88fb is buggy, dev hsr_slave_1 03:08:03 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:08:03 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:08:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000180)=0x32, 0x4) connect$inet(r0, &(0x7f0000000440)={0x2, 0x0, @broadcast}, 0x1f) setsockopt$sock_linger(r0, 0x1, 0x35, &(0x7f0000000000)={0x1}, 0x8) [ 3089.772274][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env [ 3089.847368][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:08:03 executing program 0: mkdir(0x0, 0x0) mkdir(0x0, 0x0) syz_open_dev$dri(&(0x7f00000001c0)='/dev/dri/card#\x00', 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000280), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video4linux(&(0x7f0000000340)='/dev/v4l-subdev#\x00', 0x481, 0x80) ioctl$VIDIOC_G_PRIORITY(r0, 0x80045643, 0x3) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(0xffffffffffffffff, 0x810c5701, 0x0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0x208001, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$sock_bt_hidp_HIDPCONNDEL(0xffffffffffffffff, 0x400448c9, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$MISDN_TIME_STAMP(r1, 0x0, 0x1, 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0/file0\x00') ioctl$SNDRV_CTL_IOCTL_PCM_INFO(0xffffffffffffffff, 0xc1205531, &(0x7f0000000740)={0x0, 0x0, 0x587602a5, 0x0, [], [], [], 0x0, 0x9, 0x0, 0xd4e1, "9acbda68b9e6eaf201883ed741b93e44"}) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x8020, 0x0) 03:08:03 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:08:03 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet6_tcp_int(r1, 0x6, 0xb, 0x0, &(0x7f0000000140)) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000000)={0xfffffffffffffe1a, 0x0}, 0x10) 03:08:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:08:04 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) [ 3090.524374][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env 03:08:04 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000840)=ANY=[@ANYRESHEX], 0xb5) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100), 0x0) [ 3090.575580][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:08:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:08:04 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:08:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000002e0005000000e0713c444d00020000001000034014000000053582c137153e370000000000000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 03:08:04 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x7}]}}}]}, 0x3c}}, 0x0) [ 3091.271899][ T3241] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3091.348178][ T3241] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. 03:08:05 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) fdatasync(0xffffffffffffff9c) r1 = dup2(r0, r0) ioctl$VIDIOC_QUERYCAP(r1, 0x80685600, &(0x7f0000000380)) socket$inet6(0xa, 0x1000000000002, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_DEL_DEST(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)=ANY=[]}, 0x1, 0x0, 0x0, 0x90}, 0xfffffffffffffffd) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='net\x00') r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f00000006c0)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000000280)=0xe8) r6 = getgid() fchown(r2, r5, r6) ioctl$VIDIOC_STREAMOFF(r2, 0x40045613, &(0x7f00000000c0)=0x10000) mq_open(&(0x7f0000000000)='..\x00', 0x0, 0x0, &(0x7f0000000040)) r7 = socket$inet_dccp(0x2, 0x6, 0x0) fgetxattr(r2, &(0x7f0000000080)=@random={'trusted.', '\x00'}, &(0x7f00000005c0)=""/240, 0xf0) listen(r4, 0x6) setsockopt(r7, 0x10d, 0x800000000d, &(0x7f00001c9fff)="03", 0x1) connect$inet(r7, &(0x7f0000e5c000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000440)={'bcsh0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="20000000690000003ac6a7be1146f1b82a29b37471c2335f9efe2f6853a7431dadbb66a0a63e7eb8801772f37289412b769e87e04cdea2e149004df07a48aed39bdf1f681271e92dbceff91524497acfe6d5cd22d44e62d88c82211ef49cfd0e7743bc7a0506000000000000003390897c"]}) r8 = accept(r4, 0x0, &(0x7f00000001c0)=0x281) read(r7, &(0x7f0000000480)=""/144, 0x90) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x2710}, 0x10) syz_open_dev$adsp(&(0x7f0000000240)='/dev/adsp#\x00', 0x101, 0x40000) inotify_add_watch(r7, &(0x7f0000000180)='./file0\x00', 0x9) write(0xffffffffffffffff, &(0x7f00000001c0), 0xfffffffffffffd45) sendmmsg(r7, &(0x7f0000005700)=[{{&(0x7f0000003900)=@pptp, 0x80, &(0x7f0000003b80), 0x3a5, &(0x7f0000003bc0)}}], 0x3a6, 0x0) setsockopt$SO_BINDTODEVICE(r8, 0x1, 0x19, &(0x7f0000000100)='erspan0\x00', 0xfc) sendmmsg(r8, &(0x7f000000a080)=[{{&(0x7f0000005440)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2, {0xa, 0x0, 0x0, @ipv4={[], [], @local}}}}, 0x80, &(0x7f0000005640)=[{&(0x7f00000097c0)="bf", 0x1}], 0x1, 0x0, 0x0, 0x1}}], 0x1, 0x0) 03:08:05 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000002e0005000000e0713c444d00020000001000034014000000053582c137153e370000000000000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 3091.453625][ T3247] kobject: 'bond9' (0000000003868509): kobject_add_internal: parent: 'net', set: 'devices' [ 3091.505727][ T3247] kobject: 'bond9' (0000000003868509): kobject_uevent_env [ 3091.520900][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env [ 3091.539839][ T3247] kobject: 'bond9' (0000000003868509): fill_kobj_path: path = '/devices/virtual/net/bond9' [ 3091.566699][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3091.602111][ T3247] kobject: 'queues' (000000009684d097): kobject_add_internal: parent: 'bond9', set: '' [ 3091.665510][ T3247] kobject: 'queues' (000000009684d097): kobject_uevent_env [ 3091.688421][ T3247] kobject: 'queues' (000000009684d097): kobject_uevent_env: filter function caused the event to drop! 03:08:05 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000002e0005000000e0713c444d00020000001000034014000000053582c137153e370000000000000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 3091.722582][ T3247] kobject: 'rx-0' (0000000027e4e574): kobject_add_internal: parent: 'queues', set: 'queues' [ 3091.796221][ T3247] kobject: 'rx-0' (0000000027e4e574): kobject_uevent_env [ 3091.842058][ T3247] kobject: 'rx-0' (0000000027e4e574): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-0' [ 3091.856229][ T3569] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3091.950546][ T3569] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3091.961494][ T3247] kobject: 'rx-1' (000000006a4e02fd): kobject_add_internal: parent: 'queues', set: 'queues' [ 3092.041125][ T3247] kobject: 'rx-1' (000000006a4e02fd): kobject_uevent_env [ 3092.083613][ T3247] kobject: 'rx-1' (000000006a4e02fd): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-1' 03:08:05 executing program 1: syz_open_dev$mice(0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xff, @broadcast, 0x0, 0x2, 'fo\x00'}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00'}) [ 3092.127587][ T3247] kobject: 'rx-2' (000000005e6bd382): kobject_add_internal: parent: 'queues', set: 'queues' 03:08:05 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000002e0005000000e0713c444d00020000001000034014000000053582c137153e370000000000000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 03:08:06 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000010c0)='fdinfo\x00') getdents(r0, &(0x7f0000000080)=""/79, 0x18) [ 3092.224858][ T3247] kobject: 'rx-2' (000000005e6bd382): kobject_uevent_env [ 3092.260941][ T3247] kobject: 'rx-2' (000000005e6bd382): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-2' [ 3092.314413][ T3247] kobject: 'rx-3' (00000000cc1b7053): kobject_add_internal: parent: 'queues', set: 'queues' [ 3092.351106][ T3247] kobject: 'rx-3' (00000000cc1b7053): kobject_uevent_env 03:08:06 executing program 5: r0 = socket$inet6(0xa, 0x400000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup(r0) setsockopt$inet6_tcp_int(r2, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x8, 0x0, "9f69e7a7bc7cd1bde4c3988b7adea76fa50cd597590600000000000000b93624fb01b86d7c1d88f3c7322926d8f0fcdb51b5df3ba8b696320eb85ae1bd8e6af048c54f27e0dad819d7cb50aaa2bc300f"}, 0xd8) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0xffffff91, 0x20000008, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x6e) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x7fff) sendfile(r2, r3, 0x0, 0x8000ffffbffe) [ 3092.372719][ T3247] kobject: 'rx-3' (00000000cc1b7053): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-3' 03:08:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f000001bfc8)={0x0, 0x2e9, &(0x7f0000000200)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x801, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}, @IFLA_PROTO_DOWN={0x8, 0xa}]}, 0x30}}, 0x0) [ 3092.418010][ T3247] kobject: 'rx-4' (000000008b906c2f): kobject_add_internal: parent: 'queues', set: 'queues' [ 3092.492352][ T3247] kobject: 'rx-4' (000000008b906c2f): kobject_uevent_env [ 3092.512551][ T3715] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 3092.545110][ T3247] kobject: 'rx-4' (000000008b906c2f): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-4' [ 3092.555427][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env [ 3092.563200][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3092.587745][ T3247] kobject: 'rx-5' (0000000042755a89): kobject_add_internal: parent: 'queues', set: 'queues' [ 3092.595483][ T3715] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3092.624904][ T3247] kobject: 'rx-5' (0000000042755a89): kobject_uevent_env [ 3092.660855][ T3247] kobject: 'rx-5' (0000000042755a89): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-5' [ 3092.683669][ T3721] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 03:08:06 executing program 1: syz_open_dev$mice(0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xff, @broadcast, 0x0, 0x2, 'fo\x00'}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00'}) [ 3092.711635][ T3247] kobject: 'rx-6' (0000000083ce338b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3092.712206][ T3721] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3092.751813][ T3247] kobject: 'rx-6' (0000000083ce338b): kobject_uevent_env [ 3092.781773][ T3247] kobject: 'rx-6' (0000000083ce338b): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-6' 03:08:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000002e0005000000e0713c444d00020000001000034014000000053582c137153e370000000000000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 3092.832241][ T3247] kobject: 'rx-7' (000000007fc3f4be): kobject_add_internal: parent: 'queues', set: 'queues' [ 3092.870681][ T3247] kobject: 'rx-7' (000000007fc3f4be): kobject_uevent_env 03:08:06 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000002e0005000000e0713c444d00020000001000034014000000053582c137153e370000000000000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) [ 3092.922694][ T3247] kobject: 'rx-7' (000000007fc3f4be): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-7' [ 3092.962885][ T3247] kobject: 'rx-8' (00000000b3c98608): kobject_add_internal: parent: 'queues', set: 'queues' [ 3092.979976][ T3247] kobject: 'rx-8' (00000000b3c98608): kobject_uevent_env [ 3092.988767][ T3247] kobject: 'rx-8' (00000000b3c98608): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-8' [ 3093.057678][ T3247] kobject: 'rx-9' (00000000c3b195cd): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.117847][ T3247] kobject: 'rx-9' (00000000c3b195cd): kobject_uevent_env [ 3093.139972][ T3247] kobject: 'rx-9' (00000000c3b195cd): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-9' [ 3093.153171][ T26] kauditd_printk_skb: 206 callbacks suppressed [ 3093.153186][ T26] audit: type=1400 audit(1552187286.913:29784): avc: denied { create } for pid=4085 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3093.193610][ T3247] kobject: 'rx-10' (00000000467197b6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.195440][ T4091] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 3093.224694][ T3247] kobject: 'rx-10' (00000000467197b6): kobject_uevent_env [ 3093.228274][ T4091] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3093.248171][ T26] audit: type=1400 audit(1552187286.953:29785): avc: denied { write } for pid=4085 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3093.255577][ T3247] kobject: 'rx-10' (00000000467197b6): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-10' [ 3093.322605][ T26] audit: type=1400 audit(1552187287.082:29786): avc: denied { create } for pid=4100 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3093.327565][ T3247] kobject: 'rx-11' (00000000a527a110): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.377295][ T3247] kobject: 'rx-11' (00000000a527a110): kobject_uevent_env [ 3093.385569][ T3247] kobject: 'rx-11' (00000000a527a110): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-11' [ 3093.399831][ T3247] kobject: 'rx-12' (00000000bdbc1815): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.413312][ T3247] kobject: 'rx-12' (00000000bdbc1815): kobject_uevent_env [ 3093.422826][ T3247] kobject: 'rx-12' (00000000bdbc1815): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-12' [ 3093.435370][ T3247] kobject: 'rx-13' (00000000a7fe85a7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.447916][ T3247] kobject: 'rx-13' (00000000a7fe85a7): kobject_uevent_env [ 3093.456544][ T3247] kobject: 'rx-13' (00000000a7fe85a7): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-13' [ 3093.470835][ T3247] kobject: 'rx-14' (00000000b1aac57d): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.483318][ T3247] kobject: 'rx-14' (00000000b1aac57d): kobject_uevent_env [ 3093.493524][ T3247] kobject: 'rx-14' (00000000b1aac57d): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-14' [ 3093.506718][ T3247] kobject: 'rx-15' (0000000040fdc4b9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.519920][ T3247] kobject: 'rx-15' (0000000040fdc4b9): kobject_uevent_env [ 3093.528326][ T3247] kobject: 'rx-15' (0000000040fdc4b9): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/rx-15' [ 3093.542946][ T3247] kobject: 'tx-0' (000000000b0088b9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.553870][ T3247] kobject: 'tx-0' (000000000b0088b9): kobject_uevent_env [ 3093.561907][ T3247] kobject: 'tx-0' (000000000b0088b9): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-0' [ 3093.573455][ T3247] kobject: 'tx-1' (000000001714ae0b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.584710][ T3247] kobject: 'tx-1' (000000001714ae0b): kobject_uevent_env [ 3093.592098][ T3247] kobject: 'tx-1' (000000001714ae0b): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-1' [ 3093.606783][ T3247] kobject: 'tx-2' (00000000455dc678): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.622295][ T3247] kobject: 'tx-2' (00000000455dc678): kobject_uevent_env [ 3093.633554][ T3247] kobject: 'tx-2' (00000000455dc678): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-2' [ 3093.645945][ T3247] kobject: 'tx-3' (000000008390956f): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.661122][ T3247] kobject: 'tx-3' (000000008390956f): kobject_uevent_env [ 3093.669514][ T3247] kobject: 'tx-3' (000000008390956f): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-3' [ 3093.682883][ T3247] kobject: 'tx-4' (0000000012590f7b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.693691][ T3247] kobject: 'tx-4' (0000000012590f7b): kobject_uevent_env [ 3093.702238][ T3247] kobject: 'tx-4' (0000000012590f7b): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-4' [ 3093.719437][ T3247] kobject: 'tx-5' (0000000093ed1cc2): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.739102][ T3247] kobject: 'tx-5' (0000000093ed1cc2): kobject_uevent_env [ 3093.753405][ T3247] kobject: 'tx-5' (0000000093ed1cc2): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-5' [ 3093.773818][ T3247] kobject: 'tx-6' (00000000f63ddfc5): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.792054][ T3247] kobject: 'tx-6' (00000000f63ddfc5): kobject_uevent_env [ 3093.806247][ T3247] kobject: 'tx-6' (00000000f63ddfc5): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-6' [ 3093.828088][ T3247] kobject: 'tx-7' (00000000a6f96f2d): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.839712][ T3247] kobject: 'tx-7' (00000000a6f96f2d): kobject_uevent_env [ 3093.850271][ T3247] kobject: 'tx-7' (00000000a6f96f2d): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-7' [ 3093.862821][ T3247] kobject: 'tx-8' (00000000d2ef571d): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.876635][ T3247] kobject: 'tx-8' (00000000d2ef571d): kobject_uevent_env [ 3093.883690][ T3247] kobject: 'tx-8' (00000000d2ef571d): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-8' [ 3093.899759][ T3247] kobject: 'tx-9' (0000000090bc504f): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.911259][ T3247] kobject: 'tx-9' (0000000090bc504f): kobject_uevent_env [ 3093.921631][ T3247] kobject: 'tx-9' (0000000090bc504f): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-9' [ 3093.933760][ T3247] kobject: 'tx-10' (00000000c6e666b5): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.947580][ T3247] kobject: 'tx-10' (00000000c6e666b5): kobject_uevent_env [ 3093.954722][ T3247] kobject: 'tx-10' (00000000c6e666b5): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-10' [ 3093.969452][ T3247] kobject: 'tx-11' (00000000e8e40b3c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3093.980937][ T3247] kobject: 'tx-11' (00000000e8e40b3c): kobject_uevent_env [ 3093.991386][ T3247] kobject: 'tx-11' (00000000e8e40b3c): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-11' [ 3094.003806][ T3247] kobject: 'tx-12' (0000000000a509e5): kobject_add_internal: parent: 'queues', set: 'queues' [ 3094.017586][ T3247] kobject: 'tx-12' (0000000000a509e5): kobject_uevent_env [ 3094.024728][ T3247] kobject: 'tx-12' (0000000000a509e5): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-12' [ 3094.039441][ T3247] kobject: 'tx-13' (000000008a89b135): kobject_add_internal: parent: 'queues', set: 'queues' [ 3094.051090][ T3247] kobject: 'tx-13' (000000008a89b135): kobject_uevent_env [ 3094.061610][ T3247] kobject: 'tx-13' (000000008a89b135): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-13' [ 3094.074126][ T3247] kobject: 'tx-14' (00000000448fa632): kobject_add_internal: parent: 'queues', set: 'queues' [ 3094.087809][ T3247] kobject: 'tx-14' (00000000448fa632): kobject_uevent_env [ 3094.094961][ T3247] kobject: 'tx-14' (00000000448fa632): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-14' [ 3094.109682][ T3247] kobject: 'tx-15' (000000004b676334): kobject_add_internal: parent: 'queues', set: 'queues' [ 3094.121297][ T3247] kobject: 'tx-15' (000000004b676334): kobject_uevent_env [ 3094.131559][ T3247] kobject: 'tx-15' (000000004b676334): fill_kobj_path: path = '/devices/virtual/net/bond9/queues/tx-15' [ 3094.144938][ T3247] kobject: 'batman_adv' (00000000fb22e36e): kobject_add_internal: parent: 'bond9', set: '' 03:08:07 executing program 2: syz_open_dev$mice(0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xff, @broadcast, 0x0, 0x2, 'fo\x00'}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00'}) 03:08:07 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x7}]}}}]}, 0x3c}}, 0x0) 03:08:07 executing program 1: syz_open_dev$mice(0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xff, @broadcast, 0x0, 0x2, 'fo\x00'}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00'}) 03:08:07 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2e0000002e0005000000e0713c444d00020000001000034014000000053582c137153e370000000000000000d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x2}, 0x0) 03:08:07 executing program 5: getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000006c0)=@sack_info={0x0, 0x9}, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x13, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x2}, 0x48) r1 = add_key(0x0, 0x0, &(0x7f0000000280), 0x0, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffe8d, r1) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x98f90a, 0xfffffffffffffffd, [], @p_u32=&(0x7f0000000040)}}) 03:08:07 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) [ 3094.311714][ T26] audit: type=1400 audit(1552187288.064:29787): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3094.343268][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env [ 3094.386329][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' 03:08:08 executing program 2: syz_open_dev$mice(0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xff, @broadcast, 0x0, 0x2, 'fo\x00'}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00'}) [ 3094.424814][ T26] audit: type=1400 audit(1552187288.094:29788): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3094.519620][ T4235] netlink: 'syz-executor.3': attribute type 3 has an invalid length. [ 3094.523066][ T26] audit: type=1400 audit(1552187288.094:29789): avc: denied { search } for pid=3873 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:08:08 executing program 1: syz_open_dev$mice(0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xff, @broadcast, 0x0, 0x2, 'fo\x00'}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00'}) [ 3094.592363][ T26] audit: type=1400 audit(1552187288.173:29790): avc: denied { create } for pid=4215 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 3094.616454][ T4235] netlink: 10 bytes leftover after parsing attributes in process `syz-executor.3'. [ 3094.619276][ T4316] kobject: 'bond10' (0000000003c45c18): kobject_add_internal: parent: 'net', set: 'devices' 03:08:08 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) [ 3094.664051][ T4316] kobject: 'bond10' (0000000003c45c18): kobject_uevent_env [ 3094.694993][ T4316] kobject: 'bond10' (0000000003c45c18): fill_kobj_path: path = '/devices/virtual/net/bond10' [ 3094.710820][ T26] audit: type=1400 audit(1552187288.203:29791): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3094.756164][ T4316] kobject: 'queues' (0000000086c76fc0): kobject_add_internal: parent: 'bond10', set: '' [ 3094.826414][ T4316] kobject: 'queues' (0000000086c76fc0): kobject_uevent_env [ 3094.838269][ T4316] kobject: 'queues' (0000000086c76fc0): kobject_uevent_env: filter function caused the event to drop! [ 3094.847227][ T26] audit: type=1400 audit(1552187288.203:29792): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 03:08:08 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) 03:08:08 executing program 5: getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000006c0)=@sack_info={0x0, 0x9}, 0x0) r0 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x13, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x2}, 0x48) r1 = add_key(0x0, 0x0, &(0x7f0000000280), 0x0, 0xfffffffffffffffe) keyctl$instantiate_iov(0x14, 0x0, 0x0, 0xfffffffffffffe8d, r1) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f00000000c0)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x98f90a, 0xfffffffffffffffd, [], @p_u32=&(0x7f0000000040)}}) [ 3094.932329][ T4316] kobject: 'rx-0' (0000000030def093): kobject_add_internal: parent: 'queues', set: 'queues' [ 3094.961246][ T26] audit: type=1400 audit(1552187288.203:29793): avc: denied { search } for pid=23864 comm="udevd" name="/" dev="sysfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scsi_generic_device_t:s0 tclass=dir permissive=1 [ 3094.994266][ T4316] kobject: 'rx-0' (0000000030def093): kobject_uevent_env [ 3095.015340][ T4316] kobject: 'rx-0' (0000000030def093): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-0' 03:08:08 executing program 2: syz_open_dev$mice(0x0, 0x0, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000140)={0xff, @broadcast, 0x0, 0x2, 'fo\x00'}, 0x2c) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={'lo:\x05\xe6\xff\x01\x00'}) [ 3095.100899][ T4316] kobject: 'rx-1' (0000000037bfc53e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.157978][ T4316] kobject: 'rx-1' (0000000037bfc53e): kobject_uevent_env [ 3095.193523][ T4316] kobject: 'rx-1' (0000000037bfc53e): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-1' 03:08:09 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, 0x0) [ 3095.244007][ T4316] kobject: 'rx-2' (00000000f9d93dc8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.276395][ T4316] kobject: 'rx-2' (00000000f9d93dc8): kobject_uevent_env [ 3095.305982][ T4316] kobject: 'rx-2' (00000000f9d93dc8): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-2' [ 3095.326745][ T4316] kobject: 'rx-3' (0000000097e847f8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.346819][ C0] net_ratelimit: 26 callbacks suppressed [ 3095.346826][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3095.358292][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3095.390066][ T3873] kobject: 'loop4' (00000000f9a4d30e): kobject_uevent_env [ 3095.412779][ T4316] kobject: 'rx-3' (0000000097e847f8): kobject_uevent_env [ 3095.424432][ T3873] kobject: 'loop4' (00000000f9a4d30e): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3095.434703][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3095.434749][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3095.434823][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 3095.434857][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 3095.484837][ T4316] kobject: 'rx-3' (0000000097e847f8): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-3' [ 3095.508203][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3095.514016][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3095.519870][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 3095.525627][ C1] protocol 88fb is buggy, dev hsr_slave_1 [ 3095.558537][ T4316] kobject: 'rx-4' (00000000f9e89c27): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.578648][ T4316] kobject: 'rx-4' (00000000f9e89c27): kobject_uevent_env [ 3095.644935][ T4316] kobject: 'rx-4' (00000000f9e89c27): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-4' [ 3095.685649][ T4316] kobject: 'rx-5' (0000000045773997): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.703869][ T4316] kobject: 'rx-5' (0000000045773997): kobject_uevent_env [ 3095.718521][ T4316] kobject: 'rx-5' (0000000045773997): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-5' [ 3095.741139][ T4316] kobject: 'rx-6' (00000000e5362467): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.771242][ T4316] kobject: 'rx-6' (00000000e5362467): kobject_uevent_env [ 3095.800143][ T4316] kobject: 'rx-6' (00000000e5362467): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-6' [ 3095.837885][ T4316] kobject: 'rx-7' (000000003baea307): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.854634][ T4316] kobject: 'rx-7' (000000003baea307): kobject_uevent_env [ 3095.862041][ T4316] kobject: 'rx-7' (000000003baea307): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-7' [ 3095.873276][ T4316] kobject: 'rx-8' (00000000e2a54690): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.883583][ T4316] kobject: 'rx-8' (00000000e2a54690): kobject_uevent_env [ 3095.890768][ T4316] kobject: 'rx-8' (00000000e2a54690): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-8' [ 3095.902049][ T4316] kobject: 'rx-9' (0000000070fa6f5b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.913062][ T4316] kobject: 'rx-9' (0000000070fa6f5b): kobject_uevent_env [ 3095.920207][ T4316] kobject: 'rx-9' (0000000070fa6f5b): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-9' [ 3095.931496][ T4316] kobject: 'rx-10' (0000000067bf0303): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.941832][ T4316] kobject: 'rx-10' (0000000067bf0303): kobject_uevent_env [ 3095.966571][ T4316] kobject: 'rx-10' (0000000067bf0303): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-10' [ 3095.978174][ T4316] kobject: 'rx-11' (00000000b5fc938f): kobject_add_internal: parent: 'queues', set: 'queues' [ 3095.988555][ T4316] kobject: 'rx-11' (00000000b5fc938f): kobject_uevent_env [ 3095.996051][ T4316] kobject: 'rx-11' (00000000b5fc938f): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-11' [ 3096.007424][ T4316] kobject: 'rx-12' (00000000192cd778): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.017795][ T4316] kobject: 'rx-12' (00000000192cd778): kobject_uevent_env [ 3096.025042][ T4316] kobject: 'rx-12' (00000000192cd778): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-12' [ 3096.036418][ T4316] kobject: 'rx-13' (00000000bc310d17): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.046737][ T4316] kobject: 'rx-13' (00000000bc310d17): kobject_uevent_env [ 3096.053957][ T4316] kobject: 'rx-13' (00000000bc310d17): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-13' [ 3096.065372][ T4316] kobject: 'rx-14' (000000009ca57cf1): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.075748][ T4316] kobject: 'rx-14' (000000009ca57cf1): kobject_uevent_env [ 3096.082973][ T4316] kobject: 'rx-14' (000000009ca57cf1): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-14' [ 3096.094387][ T4316] kobject: 'rx-15' (000000002b0327b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.104679][ T4316] kobject: 'rx-15' (000000002b0327b8): kobject_uevent_env [ 3096.111869][ T4316] kobject: 'rx-15' (000000002b0327b8): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/rx-15' [ 3096.123318][ T4316] kobject: 'tx-0' (000000007aecbf78): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.133600][ T4316] kobject: 'tx-0' (000000007aecbf78): kobject_uevent_env [ 3096.140739][ T4316] kobject: 'tx-0' (000000007aecbf78): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/tx-0' [ 3096.152013][ T4316] kobject: 'tx-1' (00000000987d7681): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.162318][ T4316] kobject: 'tx-1' (00000000987d7681): kobject_uevent_env [ 3096.169639][ T4316] kobject: 'tx-1' (00000000987d7681): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/tx-1' [ 3096.180847][ T4316] kobject: 'tx-2' (00000000b2016128): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.191221][ T4316] kobject: 'tx-2' (00000000b2016128): kobject_uevent_env [ 3096.198367][ T4316] kobject: 'tx-2' (00000000b2016128): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/tx-2' [ 3096.209616][ T4316] kobject: 'tx-3' (000000001e058383): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.219884][ T4316] kobject: 'tx-3' (000000001e058383): kobject_uevent_env [ 3096.227063][ T4316] kobject: 'tx-3' (000000001e058383): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/tx-3' [ 3096.238288][ T4316] kobject: 'tx-4' (00000000c7d5816c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.248609][ T4316] kobject: 'tx-4' (00000000c7d5816c): kobject_uevent_env [ 3096.257747][ T4316] kobject: 'tx-4' (00000000c7d5816c): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/tx-4' [ 3096.269059][ T4316] kobject: 'tx-5' (00000000f9d292e7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3096.281303][ T4316] kobject: 'tx-5' (00000000f9d292e7): kobject_uevent_env [ 3096.288664][ T4316] kobject: 'tx-5' (00000000f9d292e7): fill_kobj_path: path = '/devices/virtual/net/bond10/queues/tx-5' [ 3096.301821][ T4316] kobject: 'tx-6' (00000000242ad39d): kobject_add_internal: parent: 'queues', set: 'queues'