[ 73.238112][ T24] audit: type=1800 audit(1561936405.200:29): pid=8920 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 Starting mcstransd: [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 77.441747][ T24] kauditd_printk_skb: 5 callbacks suppressed [ 77.441762][ T24] audit: type=1400 audit(1561936409.400:35): avc: denied { map } for pid=9098 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.10.42' (ECDSA) to the list of known hosts. 2019/06/30 23:13:36 fuzzer started [ 84.306396][ T24] audit: type=1400 audit(1561936416.270:36): avc: denied { map } for pid=9107 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/06/30 23:13:38 dialing manager at 10.128.0.26:44265 2019/06/30 23:13:38 syscalls: 2488 2019/06/30 23:13:38 code coverage: enabled 2019/06/30 23:13:38 comparison tracing: enabled 2019/06/30 23:13:38 extra coverage: extra coverage is not supported by the kernel 2019/06/30 23:13:38 setuid sandbox: enabled 2019/06/30 23:13:38 namespace sandbox: enabled 2019/06/30 23:13:38 Android sandbox: /sys/fs/selinux/policy does not exist 2019/06/30 23:13:38 fault injection: enabled 2019/06/30 23:13:38 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/06/30 23:13:38 net packet injection: enabled 2019/06/30 23:13:38 net device setup: enabled 23:15:56 executing program 0: openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) r0 = request_key(&(0x7f0000000040)='.dead\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000000c0)='/dev/video0\x00', 0xfffffffffffffffc) r1 = request_key(&(0x7f0000001680)='trusted\x00', &(0x7f00000016c0)={'syz', 0x3}, &(0x7f0000001700)='/dev/video0\x00', 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r0, &(0x7f0000001600)=[{&(0x7f0000000100)="e26fccf635dd201219f0d481e3ba7c1d06e78ef5f162939c1cd663c15d891eabaae78fc867f9e09e4b44103f2a9287222f99e081dd6cc1f640724d689628b7e9ba5cb82053095bd4cd85dd326dabb0c3d85708718ad1ef239b17526a1e1ec56d27a851f359713f8402a8d19b70af5fbb12e445560f5b187e51090be2075f6b6105f852d588620a14525bbb1c11b54d5d134b66b810cd5c22f1225bc8dc5e97e95a462e5bb3317543dd570beb3f3ed0c6d8b2b0827a82f83c82b18415b328d2bacd8848", 0xc3}, {&(0x7f0000000200)="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", 0xfb}, {&(0x7f0000000300)="987c36941f4063dad695a90df1573836ea317b5d806a1e336bb22b90b49075cae8396e9a0955b4adee0ac17f15e689f5e8d4cd4a5afc1edc923dc8e4bb31c42dd4fdff81970f1779937b94ddb0b1a36b1b484ae39073f6b3beadeb5d3e3de0639f85605b031b251772dcb84b2d1c3484a617dd564cb58c5d20f4f9b3a434d476270c045c0c6c5eff5aaab729773e8a64a34224f7d7ffc9437ca7412d09ef4930e9a8aacb41457bb2b9249964ab9dcf95b16f452ce4480cbaeefff8b66ddc13ff64bd3171e205c8d6a593395fcbe47beed9ddba02a1a32b60d4fd0d7ade1d28fc7b67c131f6", 0xe5}, {&(0x7f0000000400)="43fb4ec9a3ef3fd4434c53cb00abe5480f692656a4b1d80222932ab2c7f54ce87bc6137c10f60f7440b0fb889e2b236b3a42f6ae06442dc099f546ceb93b862fe9b9103edc1b498597445c60bd651e910c86f41cc543423c275d17aba266e75d1b6203a1976bb33eb0cd3a82321b25caa265366166f9530666b6a49b0aface2bf610e44748361fb8e3b6ef9ee1d59e58d7d26e3cefec9f3e25b7da6e9f616029e117a53fb6dd54d98dddc2111e40f2acdcf1cf88dfb77c91508e1321495ce7f0b63c9508e6961f343da5d44a28cbbf4fffee4639b12c8b31098e2d47616d13e1e41933a239f400dfcabde06599689940b698ba4d0d3437b007641270f156a6c3dd1f9630cdd929b0942db8322bc45a8cbca2bf5da3473e1a7d535a38165c10c6951cef73a13c1db69647311f3c730857ffabf8177622632c3702df514c67d7698efac45bb6afb639adfd65c3818cd4d1bad904f70c278da7b6c72db5dae856c1493b8354026ff496e2d77c3b5c1a324eb5858eb459fb514cbbe7615ac396f6fc604b7328b99e2f3e37e2142505292e3add21a098d8bd0107f25151f8f496828d639952842378e18713f302356bbe3ef267aafc61717b0a28d68d5e5a2035ba862870cf8039822398da9a72a4954010a69ea29ad346c7fabfba9e01d7654ee2312cb83a7356e6b13248e6e47afcedcb33d5ddcdd8d60e6b28eccf1aedd2f767f4eb6ec2328c9799dbf32c5be96fba9a236b1e4da01f160912583ef9f977a67714b056076afb72dcef8ac37f3f802217ffc58ed25d4fb43b8174c7b814250449adea390ac4fcf1103d0af10581f477c7ab669b74a378dfab31a16f2f5c1e66cd17cd08a3a7e64cfbd1f40a922e60c030662a70912705da7216290c8a4431a802ad14c9019fab697092fdb66fff85e601303e56fa796ce65fc8337db1cd618b5917f3ed607db42243994c4eb10f5e12278f1457b617c766b509e52a9ea49c521c59556a4b93cd25babbf5100f917646005cec5ed235798d898a4f7f367d9e646b06b682eae20a6680dd76a93de2ac04a7ba049bf4295ff524d6e9235484dc5d17ad4a7b1d83b62ae7f805aee0382dc5a344e5baf7a1ea0829e969064da54657ab515f012734373f4b47b82c8822c537f57602f78fb89787a4e57eb70ae0ad9304fb18f9310c515094053f542d527cbe450046a58618f833a218a21c62f7d89b3ba5cafdcc427da18f3f5f59a15a2079f289ba8d6646ee246779244e43a98b7186c68219e333642290085e5b2cc6b73a0002580de177c10f96a795dd07bc675c50902a03b1b02822200cc59941325a355d13f1f7e46ca442c9fa607a048cf7b5d370ca97acb887bbfc97e06266fabecfa1d2dee41fa58f1e7175a2576bd3276c4260a85f868bd3a8ccc06d63a53ba6cd9e4828571bc39f0c6e722fc8a231782f910a54561f18a2417d37c9eb58bf421a507e5746dd8effc153bd866409006ee74bccb5b43b30240da10484dcabe3e556fd4af4fad46efb32ff06e6b904ee70a868222e3c6be69f48b9eccb623107ce78c6dad9e6d2081abc7880d459420049e4b3306e09d813b0920f9544fd06d2b272bfa7c4189deb5986b4e87e58531800978da3dfc1f762b9ca14f13ca48ec4cba2714b55557733e7a0a404d0177052ca00e7eb3b63d1dd68d24da0999b5efc342f08b62c9fa62a90d454c17cf5f56098274d2b1b949fcbb8a014bd04f3a8644c281bfde15cbfb292f9d226a46aa698a3c17cb69be083ca0fffb16f2b1157f0b9299c80b7a2d9f3723271ff3e1e3107c7ffe4923688d4cfe5e2a5bac1e0d700439fbea5620a6ee67e574a62626790f5125f73a6e9a3daaab3b97c49ce96f67f476f44372a87eab4bead97f084bb594a47505cb3ccdedcdfd57c1076af239cb0f318626dbd2366cbdcc31fa20f1fe60d64e5261155f769883202b57e2fb5926fc5ed2898eb65abc21cd97b799c92a24c295dc41ea8ec4cd52ba5ce6d15077b184ff60e909b6f7a8fe95db093a846843b57d09e8a458661c8847ba6e459fd69ec110f012e91c27bca110bebefbcfb92379870d5d2b3f8e123cc2014b41b1d4f16d98bb107b881db8ef01f19380c489c34d6d3ef9e16c58f23d423013181d1305dd2a4c3d5c47d5745daa5a7464d32cebe4d0ab9c78368530215923f36997f518c3c2512d58a1bf57912aedd0634c56dcfb51610893d0fc3f5a27bef2bc5c9624ec4b431528a094869c9252e1ea039691deb89d0ec97b113bd5d8b6e045329f70017e699850ae8a27beb43ef3f3e515414e08423b7c4dc3c080d59fbe88e68df2928b5647e573285684986c03ce338b6005711b9dd4d2696cfd0bdde0055477588a226a7b9197d5b48082aabb42719f6ecc0b8183ccd065519d8a24a7bf6da4e52b31eaa7870178e7c85fdfc7b3d9bfdb3d0c4406f3769d52b5c20a030edc2cd44a957179aea51e43baa8108920d6f3550ae672f90c9b0e39559051055dd9a0c68d7471f44f38ef977c37928d148f123fb5eba8fff39955ac018274540e1ab2f02ee55c0e5662a93e3d66a54bb2c8edfe9b38a502e6a29e6ad19266be1fadd2ab9f7d113f2e6fcc156ee75a193966b610510416acd320ed458697a955930f72a2346880a878f70a485f0ce8bac228530be00fb78cf0ddfb8875e91feb020165297b49f2a86c232c3ba6058bc5e501f5df2889b5b4e2132dd3922c5cf8ed3d9b8fd709c49e46537db557d67ad62bbaf91bdd8ffd97498f55d30c418a15ad7c3cae9042325d55f33d232ddf745599bdde8b338d92f006fd9a0c17f3a7c2c30d00bc3a1f95c2bd5e32cf105d89a3cc3900ff6a16e75c08637260fe079ef1d9988888547bcf7ca00433fccf20998b99c61d5643876d164cb55567df36a5d82cfb2de340b5fe821c1b5606ccb0416023c73e2c772c32873de484e5f03ea1e70d97ca4b975649209b045b8d6cd325f77299612018de76f2ab775209679f0a62364c6c933aad3172f4a8a53aefd10c1e28cfeb6782d004f8ef0e272ba172f05242c73116de413d102ea0258ca353b9732768de508aec4286795852765364f838127b26d22a7b9ede5576a9ba65f50e370c83df7a3874089e09678f439e0ec6b018cb2afa9a37184e45d3a714874b358dfac2cd8aa6e27dbeab29b3cdf8bd9dfd3c27b0610689d578733f542e9483f775f64e6d063d45bd7aa526cb3fcaee4d9ef843818b21d49278e3ee27f2f3a8b2d16378f74483e5ff9c4d1565c176f3c848e94ebb48982e3ee417c5ad2dc7aefe59b1ecc65aff84bcf208b97e0bd8c6c3403c50ab88c1e8a5d13c4c283f8e10c7d2bdf0fcc5320a5f55bb993da11dbde883c1236ffea48ac2b62b8b0ede40fa2c2ef1588c227ee39d350c4a44a6cd54351a28ebc00a4ceeee6b6b983c549246ceb31b20b5dc5f735413c2cd1b071f1a11d9110a147ddd9c2b60f6456db16dbd7e219ed89b87d63128720f42bc20521f4aa1367f3603e2c91c718513bfde5086b988e86bc71b0a51b4192c416c1d0d9726479f5ffc38c4a98ad9d1c75569d3748372ff21f6d8facc4eb79ba102e64af17ce4a391de341ff1e3f3ce12ec230645c46959f16f6f0b1f7bebf849b134347dbe605da0179786c643559f8a3883a0eb4961f6b7c9eed62b2e35e1b1c1b5117f71b156b298f07a85577a504b788e69526a9f793d4015afb944ae44aebd26471d02916b36794130f1770f59ef860cd1a7397259de79a38601a10f7b80f2ee04e6d2491a1f3bccd87d75b940525101670ec458d1671837368f661c4fe07e3c93443dcc4ad57c4d3298a3ef181e4a77ea45019472822a2d4c448ed6e8584ec550682fb47e0b6bd62517b41d1aa47d9bf15e2d736121e6b8e3f7b20b7fac4f615140e90c402982a56c3761e2b951de0f70c71a5db07db0772517300422344db8decbac95fe2604214499aaa42e356b78db59287978731c06b8188ffd6b4d668a31ccf5dd2474fbf996236dc1cfaf5e487f7a0bb9331b2ace79f484ee7f435821413ee88589a728d068aba3a17535e0563908e5680fb3c8d64627fffca11b7b437ca6f162d30ab861ea4232389c6c91a0def9fe661a627b0d27309dc414bfb10cf0a9e022c1052701c1c4f5c8c518aeba9d03308425d07a3b51956f8e62be6e29d82a5ef0a97cffea2fdc509268782ffc4d5b16ebcd37aabe4781fe5f7855cf5835c2d8c2b7d280deb80f0aba51e7268fcf8c97110cfa2ddab9c25cb0676f4b4af03678565f312c2397c2532d93bc00d1b82004042d05f5d228b04b24afd468fd1992a03b67c4fb8e03408826599ff5ab664cfd3b6e89adea627d0ba9e6da65bd9825fa6ef8ae86fecfc49a15011b2bb700eb55ee48fb9ff64b5a3c8a032bbc5befa5c1ab092f53ff7804de66a5d4bd2b95c4a1d7b78080139cb7534f42881c3b47b5fd9909ddf7d8d82a2bbe1f9d4e719931104b643269c371562e3a724d90d62e9d6a5c0621fa01d36a962d5e5d3351e84a1be6da8ae3fd3cf00ad77a96ddb02a0ec48736ced0e4b0a91fcfc9eb4cd78c42b9c83de9929f93647aa541259e67194ffc72223688ebbfce81483f0e62a10f6f4532a1317606d0691e763b54d53b7691c5a13048c706482f7bad12b860b249b48f49cd776852a30dee930e01e89415e5ec4ee9a953387acc9f6342ea4c43321b2712cd81f247d29217707e9855561396017b46da6fd302168a164e6476671bb5996b80df677ae681d019b1407c7d07f9e7a607cba0fc2dbd3cf5ebd12b3d22f9f37218c9967906a819009ae38d8be7426aa00dbba1d4ad475b7174adf0f784703f660c15e4aff16817870b8617704e9f0e44c0502c0fe6ef17edd9d09610503a469d6730f0640658591570a67e7480c0cf959df36b5ca8e0a1700d6afd06c91f66d44b0fa5171cb0a5c0eb353eb98e7db59cd2e65b7cd1d5ad1711e2c66d6117b606e4ad43b02c4d82a607f00b535aff820647c84347dbc621e39eda1f623ea715fb81ba7418abb7adee5b80e248eca8a528c6bd51883f03a0470b2e0e35ef2cd1b98684679aca691c17b9124272161aedeef54e60ba56ed4c7967a52814d2aab71e6574a519a55ed6e17599af669d841bf89cbd02ff4d49af63c5b222249d0bfe14ac0dadc9ac78d1dcca44ce44cfc3255b471457a9c99ece6290909ef3d8e48dd939bba60441b8e1325bea6b892d7eef38149314b4748b7d2892274d286ba47d57405056775a13792b09963c75b611d55fbccb206878d4befefa2dc2144932a877262e070803fc2fe3f8199634ccc6a870a242d87d41386ec55e29a6c7fa9ec919cf4cb9dcd300001f54a2b8f50acb63cc38deaf171ac26ad0f34b41f3ad66d66c913bc57047d69dac7a6c9a4960f33e5cba52af34c1cb7767c9a8586e9ba670e312594cf4fcb9a8e16ca9952785ebaef3f00f7017694bb15b261bc341e15b4d8f207b553113655387de3cd0aeb6a85be7673c7afd4910fbe999e64bf92b1ccdd960051fa5fd2bdcbd75be56380a895ad7ce0f3628864bdc24c70688006ff6d5f2ed495c2a3bd10f4d0af5e6b289ea5fc4a3998eb82acbcf2fa6d241774ec6ea60077c0e0b4644a53e691ea45512534a7522e14c8424871954fc34c35f6fb983fe195344370081e559e277b9b966b3d2b632d7f2b44f6f7da491f9112ab4fc2cb49696f2c9d568cf7a5b7599f55708d38979fb4c90bbfaede9ffeac3092f4168db0d2942b57f63d7db8771bfd2c46d0c745ffc886e60e946ab0767736358d7c7896c6f79bbe5778c629", 0x1000}, {&(0x7f0000001400)="6ec513343d96dd62eca99c0bac43316f63f4be2839133bfac54fbf1c95b3", 0x1e}, {&(0x7f0000001440)="17361954763c321074558f261ed9f0f45dc93dda1eb4526b4e6ff577a7c3f28a1d0459496b18d4eb99d72e7eb83e44564dc32d16c25a9f091a26395470988ae1b4dd5db314e03a307885a66f2330ac96d30f8c53958a32416f1bd44b95638defb6abf772d1a6b4b44f5b86af09b3331611077f672c0aaf8fd0653d399ca8993129514db0260fd0dd5dee475ea817b92ade48d0c61e8ec446d20a1d98f0d723ea994244147ab5b675552815191a8adf5a9c45013d9d07296b42525f7702c60892af4a125a62d81cb9a2e62c209598609057cd4229267049c6a80dd4eb4adac3039f1487", 0xe3}, {&(0x7f0000001540)="cbaf4544cea8c43b05c75a57b0280833ab92edab9156d7d2811c1a3081b62405ada6ebfdce5049d251c8517d002c11ce40af794e1d35efc26f00284395e20411016e23c5ec90fd2eacadf12b36", 0x4d}, {&(0x7f00000015c0)="689f8528eef8180ab7a2113d022d0dc3d034c430d99a10a4b7a0968dcf646868f17186b002893c2d1c161b9285ff1b455ec4512eb473b055f53fbc", 0x3b}], 0x8, r1) keyctl$link(0x8, r1, r0) r2 = syz_open_dev$sndpcmc(&(0x7f0000001740)='/dev/snd/pcmC#D#c\x00', 0x1f, 0x400000) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000001780)=0x4, 0x8) setsockopt$inet_sctp_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000017c0), 0x4) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000001800)='trusted.overlay.upper\x00', &(0x7f0000001840)={0x0, 0xfb, 0x41, 0x1, 0x0, "44973052654971dcd7a122c438bd032b", "a78ea64924d7f885549b312ecbcd82316fa852b440be8357f37d5c8612c66b5ef10cf0eb213b3ce985016491"}, 0x41, 0x3) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f00000018c0)={0x2, "a8e0544b4f5ca4e368b5456b46ff979818c300f597b44e44e3ff93ac26f7fc7d", 0xc, 0x6c8, 0x80000001, 0x1, 0x3}) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000001940)={0x6, 0x1}) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000001980)={0x0, @in={{0x2, 0x4e24, @rand_addr=0x5}}, 0xfffffffffffeffff, 0x0, 0x9, 0x3, 0x80}, &(0x7f0000001a40)=0x98) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000001a80)={r3, 0x3}, &(0x7f0000001ac0)=0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r2, 0x40405515, &(0x7f0000001b00)={0x3, 0x2, 0x4, 0x9, '\x00', 0x4}) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000001b40)={r4, @in={{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x12}}}, 0x3f, 0x2}, 0x90) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000001c00)={0x0, 0x88b4, 0x200}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000001c40)={0x79, 0x0, [0x3, 0x10001, 0x80000001, 0x8]}) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001cc0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000001d00)=@assoc_value={r3, 0x8}, &(0x7f0000001d40)=0x8) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) r6 = syz_init_net_socket$nfc_llcp(0x27, 0x0, 0x1) ioctl$SIOCAX25GETINFOOLD(r5, 0x89e9, &(0x7f0000001d80)) timerfd_gettime(r2, &(0x7f0000001dc0)) keyctl$instantiate(0xc, r0, &(0x7f0000001e00)=@encrypted_new={'new ', 'ecryptfs', 0x20, 'trusted:', 'GPLnodev', 0x20, 0x4}, 0x33, 0xfffffffffffffffd) ioctl$TCGETS2(r5, 0x802c542a, &(0x7f0000001e40)) ioctl$sock_inet6_udp_SIOCINQ(r6, 0x541b, &(0x7f0000001e80)) bind$netrom(r2, &(0x7f0000001ec0)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x2}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$PIO_FONTRESET(r2, 0x4b6d, 0x0) getsockopt$inet_sctp6_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000001f40), &(0x7f0000001f80)=0x8) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002000)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000002180)={&(0x7f0000001fc0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002140)={&(0x7f0000002040)={0xdc, r7, 0xa29, 0x40, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x6c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @rand_addr=0x6}}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7225}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffffffffff801}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000000}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40000}, 0x20000000) [ 224.540133][ T24] audit: type=1400 audit(1561936556.500:37): avc: denied { map } for pid=9124 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16181 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 224.673816][ T9125] IPVS: ftp: loaded support on port[0] = 21 23:15:56 executing program 1: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000040)) ioctl$KVM_GET_PIT2(r0, 0x8070ae9f, &(0x7f0000000080)) r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2) sendfile(r0, r1, &(0x7f0000000140), 0x3) fsopen(&(0x7f0000000180)='ext4\x00', 0x1) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000001c0)={0x1}) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000200)) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000240)) setsockopt$nfc_llcp_NFC_LLCP_RW(r1, 0x118, 0x0, &(0x7f0000000280)=0x3, 0x4) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000003c0)={'broute\x00', 0x0, 0x4, 0xbc, [], 0x3, &(0x7f00000002c0)=[{}, {}, {}], &(0x7f0000000300)=""/188}, &(0x7f0000000440)=0x78) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x400, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f00000004c0)={r3, 0x0, 0x200, 0xfffffffffffff9a1, 0x6}) listen(r0, 0x101) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@empty}}, &(0x7f0000000840)=0xe8) syz_mount_image$ntfs(&(0x7f0000000500)='ntfs\x00', &(0x7f0000000540)='.\x00', 0x9, 0x2, &(0x7f0000000700)=[{&(0x7f0000000580)="6ebe312b4bdf3c529b84d2d170a58675e1607c09b5fb6f2b27faed3bc95036f4acba049e79cb85e2b61d8f943254d713ac450f0525ba3a6abfbc63d8cb103b68cb3cee9fe9c5a5c2dba59968eb4559ecf9f70bf08d7b499128903c84f09bcef8dced558ad65e81ed88aae8453579037f8c563e", 0x73, 0x478}, {&(0x7f0000000600)="db1b1027cdfcabcd73d54caed5b13efd0e423ff11541223662a4d08cb7c211b9fc0a5f31ccae3cdf9a3da79926fcadecbec4b6c0b0989c546a8b08178639c54df2aa5e33fd64a0d1754f8dff35bfdd917c7133a59ca58cba14a029135e187bc2a943cca0ca4e729b81bf1e9d7a8af52f2e988a888299b4f577f2018bfbcd56f83f4bcf5102e017acf88c376618f1f6511c3d69d6fc774008e0c2c1e3a311ccacbf57a5fa722c1028ada42026c4940b251d35d9d9790d16ed4aee1325227cbbabd1d45009874b0c1067caf611e6a4279c2acfa4500b", 0xd5, 0x2}], 0x42002, &(0x7f0000000880)={[{@fmask={'fmask', 0x3d, 0x6}}, {@errors_recover='errors=recover'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x2}}, {@uid={'uid', 0x3d, r4}}, {@errors_recover='errors=recover'}, {@case_sensitive_yes='case_sensitive=yes'}, {@nls={'nls', 0x3d, 'macromanian'}}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x2}}, {@show_sys_files_yes='show_sys_files=yes'}, {@mft_zone_multiplier={'mft_zone_multiplier', 0x3d, 0x3}}], [{@obj_role={'obj_role', 0x3d, '-ppp1user'}}]}) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000a00)={0x14, 0x25, &(0x7f00000009c0)="690adb33741f8a5a9465cdb67bef26bbd45563d11cd66c02a3d97d77f670c28ef3b3624c2e"}) connect$l2tp(r1, &(0x7f0000000a40)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @rand_addr=0x7}, 0x4, 0x3, 0x3, 0x3}}, 0x26) recvmsg$kcm(r0, &(0x7f0000003040)={&(0x7f0000000a80)=@pptp={0x18, 0x2, {0x0, @multicast2}}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000000b00)=""/51, 0x33}, {&(0x7f0000000b40)=""/151, 0x97}, {&(0x7f0000000c00)=""/171, 0xab}, {&(0x7f0000000cc0)=""/50, 0x32}, {&(0x7f0000000d00)=""/57, 0x39}, {&(0x7f0000000d40)=""/128, 0x80}, {&(0x7f0000000dc0)=""/4096, 0x1000}, {&(0x7f0000001dc0)=""/68, 0x44}, {&(0x7f0000001e40)=""/210, 0xd2}, {&(0x7f0000001f40)=""/40, 0x28}], 0xa, &(0x7f0000002040)=""/4096, 0x1000}, 0x10040) write$9p(r0, &(0x7f0000003080)="36ce330f6560de02ac26339353b2e29297135e2ef442f1dcb2fad3b868d1f9cbe4d2eb9c48f56c6f7e36a7ef3ca24689678b8d7efc76be6216778524b3db9feb2819ce206da864b145620007901d79413f968d8cfd2a4c29ad3fc90a8ad05337d12e15628c5f2a606bdf029bb71ea6bad46cb932874f0f403c5f35b076f483779af3", 0x82) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003180)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000003240)={&(0x7f0000003140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000003200)={&(0x7f00000031c0)={0x24, r5, 0xb02, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x100000000}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4) lsetxattr$trusted_overlay_origin(&(0x7f0000003280)='./file0\x00', &(0x7f00000032c0)='trusted.overlay.origin\x00', &(0x7f0000003300)='y\x00', 0x2, 0x0) socket$caif_seqpacket(0x25, 0x5, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000003340)={{{@in6, @in6=@mcast2}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000003440)=0xe8) write$9p(r1, &(0x7f0000003480)="a95e830b6f3cce753adac33eaff6d04804efce58e58b384e240ea3c0c1024e1b0785e7d7170991414b07e1d21cd9af6e17e82a29087c40452a919578f357740d5d628ab2a155c904e62140fb2b937a9d82", 0x51) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000003500)='/proc/thread-self/attr/current\x00', 0x2, 0x0) accept$packet(r1, &(0x7f0000003540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003580)=0x14) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f00000035c0)=""/8) [ 224.816513][ T9125] chnl_net:caif_netlink_parms(): no params data found [ 224.898598][ T9125] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.906798][ T9125] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.919551][ T9125] device bridge_slave_0 entered promiscuous mode [ 224.928856][ T9125] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.936237][ T9125] bridge0: port 2(bridge_slave_1) entered disabled state [ 224.944465][ T9125] device bridge_slave_1 entered promiscuous mode [ 224.968478][ T9125] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 224.979187][ T9125] bond0: Enslaving bond_slave_1 as an active interface with an up link 23:15:57 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000040)={0x28d9, 0x0, 0x1, 0x4}) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, &(0x7f0000000080)={0x401, r1, 0x1, 0xffff}) io_uring_register$IORING_UNREGISTER_BUFFERS(r0, 0x1, 0x0, 0x0) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) write$selinux_validatetrans(r0, &(0x7f0000000180)={'system_u:object_r:traceroute_exec_t:s0', 0x20, 'system_u:object_r:bsdpty_device_t:s0', 0x20, 0x7, 0x20, 'unconfined\x00'}, 0x6c) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000200)={0x0, @aes128, 0x2, "1d0ee8a0c831fb5f"}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) getpeername$unix(r0, &(0x7f0000000240), &(0x7f00000002c0)=0x6e) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000300)={0x1, 0x0, {0x100000001, 0x6, 0x0, 0xf, 0xf, 0xc, 0x2}}) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000380)={0x0, 0x1c000000000000, 0x10}, &(0x7f00000003c0)=0xc) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000400)={0x6, 0x2, 0x8008, 0x1, 0x1, 0x62, 0x101, 0xfffffffffffff000, r2}, 0x20) ioctl$KVM_ASSIGN_SET_MSIX_NR(r0, 0x4008ae73, &(0x7f0000000440)={0xffffffffffffffff, 0x8}) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000480)={@dev}, &(0x7f00000004c0)=0x14) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000500)={r2, 0x4, 0x30}, &(0x7f0000000540)=0xc) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000580)={0x400, 0x6, 0x36, 0x1, 0x1000}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000002ac0)=[{&(0x7f00000005c0)=""/4, 0x4}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000001600)=""/178, 0xb2}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/243, 0xf3}, {&(0x7f00000027c0)=""/156, 0x9c}, {&(0x7f0000002880)=""/103, 0x67}, {&(0x7f0000002900)=""/178, 0xb2}, {&(0x7f00000029c0)=""/248, 0xf8}], 0x9) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000002b80)={@dev}, &(0x7f0000002bc0)=0x14) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000002c40)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r0, &(0x7f0000002d80)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x8000209}, 0xc, &(0x7f0000002d40)={&(0x7f0000002c80)={0xa4, r3, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffff}, @IPVS_CMD_ATTR_DAEMON={0x4}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @dev={0xac, 0x14, 0x14, 0x24}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x635}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfff}, @IPVS_CMD_ATTR_SERVICE={0x10, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x33}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x40005}, 0x1) write$binfmt_misc(r0, &(0x7f0000002dc0)={'syz1', "bf90fc60988af70470816537b5d9d53be1af7eb045f9d783810186f990b2d8465931efc24916aef2c141b9"}, 0x2f) sendmsg$inet6(r0, &(0x7f00000042c0)={0x0, 0x0, &(0x7f0000004200)=[{&(0x7f0000002e00)="6438f5ca48bb71fc", 0x8}, {&(0x7f0000002e40)}, {&(0x7f0000002e80)="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", 0x1000}, {&(0x7f0000003e80)="31156f2be549de74b2bfd8cee09c9c975af6380afc5db6d413a711bf38f3645f56ab24af16f7fb1c47a472868026d240084ee6d265681fd36765010c7e2034d99ff4c52c3bd04c4c2d98f27ef045d6f8ab6f986d3ec7035f70fe5f30bfea54300ac3a5a60dc1e18c2cc1c5403411a12b12cd23454d126be41976c0a40f3e54bd4b369d639bc67395a02a843872b214540157d6a1055356eaa18c4ae8c833bb0be91a65e0836da8d1f604f06597c6614dc2cd6a60d154c538017793512cb45934f40e32c65e489fd53b0ddcd29a62e9713741c1907752600d8769231fb854fff4686d522d4cb88c71804f06d6afe10d841c293a", 0xf3}, {&(0x7f0000003f80)="062a538c66be415bb5aa07a2e73bf93d993f393767c8c06221a29dceb7ac22199ac07f42b03c538ce41f7964bebc54e8350fdf54c1a3713f4fb66d0064a9c992682eb6a896af8c5bf428875d9e0ba916922194171c2d20e5a079d33980c09be30176cb1cd78c56c7871e28539d3aa8063a32e3aaa0cfb1da9e54ca0e1a672f30cef9ff0c00812fca502facc26af8ef781593ab52eb0dcc375673b660ec8da667c84a53190d19451c318e0361d9f8e0ad3ed43b47c0ebc3961c030bf4a55c7617f251ef98", 0xc4}, {&(0x7f0000004080)="d59faf1d6a01d2557f14a2233cd4cb3a00df9293a32577dc0d1bd7d68f48c0f4cb57d13d87a99a9f9ab8b69cbc8695e4d0b982ad4dfd9ede8213f4b95240f1124973a211ec88bdd43eaf3e5319d04d7c1ce80463484b472dabad9536558f8f1343e3a350", 0x64}, {&(0x7f0000004100)="4302d64877dc2c56663ef1b8a33f9d15b294cdb628fbcdd14ee7c3d5ae2fa7205b72dda2a146c4329ba5ba549f8d16459c8da6efb8544dfe1fe6d8d28f4364660a7957b335a3ebb828f25fe115605e9a975eda4ed9f469d9c21539f400ef", 0x5e}, {&(0x7f0000004180)="2b4d169d729280a8010a597d9295d0610f4c7cf8ac5e6a2d0010f5677b8d275df3b3f5e24697fd5e1b14dcfe9cce17bfe30caed29b777fd517c626c7b19bb31d57a41f12b4d91eb30601b17d41af4fe5c1632d19e4e1e4098ebd2ac83107c0", 0x5f}], 0x8, &(0x7f0000004280)=[@dontfrag={{0x14, 0x29, 0x3e, 0x714d}}, @hoplimit={{0x14, 0x29, 0x34, 0x7fff}}], 0x30}, 0x4) openat$nullb(0xffffffffffffff9c, &(0x7f0000004300)='/dev/nullb0\x00', 0x600, 0x0) accept4$unix(r0, &(0x7f0000004340)=@abs, &(0x7f00000043c0)=0x6e, 0x80800) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000054c0)={&(0x7f0000004400)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x66, 0x66, 0x3, [@int={0xa, 0x0, 0x0, 0x1, 0x0, 0x6f, 0x0, 0x52, 0x4}, @datasec={0xc, 0x6, 0x0, 0xf, 0x2, [{0x5, 0x100000001, 0xfffffffffffffffb}, {0x2, 0x6, 0x101}, {0x3, 0x1, 0x7}, {0x3, 0x100000000, 0x7}, {0x3, 0x4, 0xe0}, {0x3, 0x6, 0x8}], "9e3e"}]}, {0x0, [0x0]}}, &(0x7f00000044c0)=""/4096, 0x83, 0x1000, 0x1}, 0x20) ioctl$FS_IOC_FSSETXATTR(r4, 0x401c5820, &(0x7f0000005500)={0x7, 0x5, 0x80000000, 0x9, 0x2}) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000005640)={&(0x7f0000005540)={0x10, 0x0, 0x0, 0x41000}, 0xc, &(0x7f0000005600)={&(0x7f0000005580)={0x44, r3, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x14}}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0x44}, 0x1, 0x0, 0x0, 0x881}, 0x20000000) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000005680)=0x7, 0x4) [ 225.000675][ T9128] IPVS: ftp: loaded support on port[0] = 21 [ 225.010552][ T9125] team0: Port device team_slave_0 added [ 225.018188][ T9125] team0: Port device team_slave_1 added [ 225.135481][ T9125] device hsr_slave_0 entered promiscuous mode [ 225.173894][ T9125] device hsr_slave_1 entered promiscuous mode [ 225.231256][ T9130] IPVS: ftp: loaded support on port[0] = 21 [ 225.258827][ T9125] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.266146][ T9125] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.273987][ T9125] bridge0: port 1(bridge_slave_0) entered blocking state 23:15:57 executing program 3: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x50000, 0x0) write$UHID_CREATE(r0, &(0x7f0000000080)={0x0, 'syz1\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000040)=""/54, 0x36, 0x5, 0x9, 0x1, 0x5, 0x7}, 0x120) write$UHID_CREATE(r0, &(0x7f0000000240)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f00000001c0)=""/93, 0x5d, 0x1, 0x1000, 0x6, 0x4080000000000, 0x1}, 0x120) write$UHID_CREATE(r0, &(0x7f0000000480)={0x0, 'syz1\x00', 'syz0\x00', 'syz0\x00', &(0x7f0000000380)=""/213, 0xd5, 0x4e8e8984, 0xfffffffffffffffb, 0x1, 0x5, 0x9}, 0x120) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f00000005c0), &(0x7f0000000600)=0x8) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000640)={'hsr0\x00', {0x2, 0x4e23, @multicast1}}) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000680)=0x800) write$cgroup_type(r0, &(0x7f00000006c0)='threaded\x00', 0x9) getgroups(0x0, &(0x7f0000000700)) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000780)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000880)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x1080a0}, 0xc, &(0x7f0000000840)={&(0x7f00000007c0)={0x78, r1, 0x0, 0x70bd29, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400000000}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'fo\x00'}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4}, 0x81) r2 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f00000008c0)={0x26930}, 0x1) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000900)=[r0, r2], 0x2) perf_event_open(&(0x7f0000000980)={0x3, 0x70, 0x1, 0x5, 0x6, 0x20, 0x0, 0x0, 0x48000, 0x4, 0x81, 0x81, 0x3, 0x1, 0x6, 0x4, 0x7, 0x7, 0xffffffffffff0000, 0xfff, 0x7, 0x40000000000, 0x9, 0x599, 0x2, 0x5, 0x3, 0x8, 0x2, 0x7, 0x3, 0xfffffffffffffffc, 0x2822fdcd, 0x69580000000, 0xe5, 0x6, 0x2, 0x9, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000940), 0x1}, 0x1, 0xfffffffffffff38f, 0x2, 0x5, 0x8, 0x3, 0xff}, 0xffffffffffffffff, 0x3, r0, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000a00)=0x0) ioprio_set$pid(0x2, r3, 0x2) r4 = semget$private(0x0, 0x4, 0x40) semctl$GETZCNT(r4, 0x1, 0xf, &(0x7f0000000a40)=""/185) setsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000b00)=0x40, 0x4) io_uring_setup(0xf74, &(0x7f0000000b40)={0x0, 0x0, 0x3, 0x2, 0x1aa}) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) setsockopt$inet_tcp_int(r0, 0x6, 0x7, &(0x7f0000000bc0)=0x21f7, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000c00)) bind$llc(r0, &(0x7f0000000c40)={0x1a, 0x301, 0x2, 0x4, 0x1, 0xffffffff, @local}, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000cc0)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000f40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000000f00)={&(0x7f0000000d00)={0x200, r5, 0x0, 0x70bd2b, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x54, 0x4, [@TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xd8fc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xa8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xcea}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK={0x58, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x404000000000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x7c, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xbe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x200}}, 0x40) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000f80)) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000fc0)={0x0, 0x7, 0x20}, &(0x7f0000001000)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000001040)={r6, 0x0, 0x7}, &(0x7f0000001080)=0x8) [ 225.281074][ T9125] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.451936][ T9133] IPVS: ftp: loaded support on port[0] = 21 23:15:57 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000c00)="8c0a21f4faeb5d3da5c159a57062ad9ac234003b95737a7b2a4c857ff86e5b5ff03974cf528525f9e68a4d4ea324974e1288e1c2ae7fe076ee4b9f4f689219a1b4ae877a25e1e6c4c2b78c43444d0c8d1549fff8f775e7308c3add65c7bb1b22229037c7fa587a78046a8a52240c514ecef129699f133c5d26915029f3320311549bd4a95c2f3fae6082d1de16f11f05e7da3ae2ddbec946f0539ea1e5b47ff7ce4e5b9a4a4479ace512e15f9dd867edda590cd5cddfff0a65669801ae5555ab") umount2(&(0x7f0000000cc0)='./file0\x00', 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000d00)={[{0x7, 0x100000001, 0x6, 0x1, 0xffffffff, 0x9c66, 0x3, 0x80000001, 0xfff, 0x1, 0x4, 0x101, 0x8}, {0x100000001, 0x6, 0x6, 0x2, 0x3, 0x8, 0x29f, 0x2, 0x0, 0x1000, 0x9, 0x6b7, 0xfff}, {0xfffffffffffffffa, 0x100000000, 0x800, 0x9, 0xff, 0x200, 0x5, 0x85, 0x6, 0xffffffff, 0xdf, 0x50000, 0x3}], 0x200}) keyctl$read(0xb, r2, &(0x7f0000000d80)=""/74, 0x4a) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/udmabuf\x00', 0x2) [ 225.527026][ T9128] chnl_net:caif_netlink_parms(): no params data found [ 225.544845][ T9125] 8021q: adding VLAN 0 to HW filter on device bond0 [ 225.605556][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 225.620284][ T3487] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.653368][ T3487] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.673204][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 225.741481][ T9125] 8021q: adding VLAN 0 to HW filter on device team0 [ 225.804030][ T9128] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.811228][ T9128] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.820222][ T9128] device bridge_slave_0 entered promiscuous mode [ 225.835299][ T9138] IPVS: ftp: loaded support on port[0] = 21 23:15:57 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000040)) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r0, 0xc034564b, &(0x7f0000000080)={0x3, 0x77735e5f, 0xfffffffffffffff9, 0xfd, 0x2, @discrete={0x2, 0x100000001}}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000000c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x24) write$FUSE_POLL(r0, &(0x7f0000000140)={0x18, 0x0, 0x7, {0x7fffffff}}, 0x18) ioctl$TIOCNXCL(r0, 0x540d) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='/dev/cachefiles\x00', r0}, 0x10) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)=0x6) ioctl$EVIOCGSND(r0, 0x8040451a, &(0x7f0000000240)=""/160) ioctl$KVM_PPC_ALLOCATE_HTAB(r0, 0xc004aea7, &(0x7f0000000300)) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000340)="81ac0e490a7e326e383670ac7bbbc399", 0x10) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000380)={{&(0x7f0000ffc000/0x2000)=nil, 0x2000}, 0x1}) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000004, 0x13, r0, 0x8000000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000400)) ioctl$int_out(r0, 0x91e8288e60654807, &(0x7f0000000440)) ioctl$VIDIOC_QUERYCTRL(r0, 0xc0445624, &(0x7f0000000480)={0x4, 0x10f, "44162e66572357e98f7e02ef1068b8b525687d74c78aea412d8f1ac8ec46cf29", 0x101, 0x94, 0x3, 0x2, 0x108}) write$P9_RAUTH(r0, &(0x7f0000000500)={0x14, 0x67, 0x1, {0x4, 0x0, 0x7}}, 0x14) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000580)={0x7, 0x2, 0x4, 0x22000, {}, {0x0, 0x3, 0x2, 0x1249, 0xa7, 0x5, "72bce087"}, 0xffffffffffff335d, 0x4, @planes=&(0x7f0000000540)={0x6, 0x5, @userptr=0x6, 0x7ff}, 0x4}) ioctl$VIDIOC_S_AUDOUT(r0, 0x40345632, &(0x7f0000000600)={0x1, "d68ea820c980eace5a3a94ccc36b1b61d8e862b42b335426b0d02b3c5d0713b1", 0x1, 0x1}) ioctl$VIDIOC_SUBDEV_S_FMT(r0, 0xc0585605, &(0x7f0000000640)={0x5b1a723a4b077d56, 0x0, {0x6, 0x0, 0x3002, 0x0, 0x3, 0x6, 0x0, 0x3}}) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f00000006c0)={0x5, 0x2, 0x8}) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000700)={0xf, 0x80000001, 0x9fa, 0x80000, r0}) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000740)={0x7, 0xfffffffffffffbff}) flock(r1, 0x4) ioctl$VIDIOC_SUBDEV_S_EDID(r0, 0xc0285629, &(0x7f00000007c0)={0x0, 0x1, 0x7, [], &(0x7f0000000780)=0x118}) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r0, 0x0, 0x483, &(0x7f0000000800)={0xaf, @empty, 0x4e21, 0x2, 'lblc\x00', 0x28, 0xb72, 0x15}, 0x2c) bind$alg(r0, &(0x7f0000000840)={0x26, 'skcipher\x00', 0x0, 0x0, 'chacha20-simd\x00'}, 0x58) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 225.850867][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 225.863257][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 225.872135][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 225.879284][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 225.889290][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 225.899171][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 225.908205][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.915342][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 225.924316][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 225.933266][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 225.954808][ T9128] bridge0: port 2(bridge_slave_1) entered blocking state [ 225.961902][ T9128] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.971263][ T9128] device bridge_slave_1 entered promiscuous mode [ 225.988166][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 225.997029][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 226.010200][ T9130] chnl_net:caif_netlink_parms(): no params data found [ 226.037859][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 226.067727][ T9128] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.070801][ T9142] IPVS: ftp: loaded support on port[0] = 21 [ 226.119200][ T9128] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.147705][ T9128] team0: Port device team_slave_0 added [ 226.156106][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 226.164703][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 226.197555][ T9130] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.205255][ T9130] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.213619][ T9130] device bridge_slave_0 entered promiscuous mode [ 226.222187][ T9128] team0: Port device team_slave_1 added [ 226.237035][ T9133] chnl_net:caif_netlink_parms(): no params data found [ 226.252761][ T9130] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.259905][ T9130] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.267811][ T9130] device bridge_slave_1 entered promiscuous mode [ 226.394494][ T9128] device hsr_slave_0 entered promiscuous mode [ 226.442776][ T9128] device hsr_slave_1 entered promiscuous mode [ 226.496696][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 226.505112][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 226.546491][ T9130] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.557660][ T9130] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.588699][ T9130] team0: Port device team_slave_0 added [ 226.595309][ T9133] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.603363][ T9133] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.611100][ T9133] device bridge_slave_0 entered promiscuous mode [ 226.619082][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 226.627790][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 226.639160][ T9125] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 226.665948][ T9130] team0: Port device team_slave_1 added [ 226.671768][ T9133] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.678970][ T9133] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.687243][ T9133] device bridge_slave_1 entered promiscuous mode [ 226.739064][ T9133] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 226.750532][ T9133] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 226.762624][ T9125] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 226.856462][ T9138] chnl_net:caif_netlink_parms(): no params data found [ 226.885507][ T9133] team0: Port device team_slave_0 added [ 226.935072][ T9130] device hsr_slave_0 entered promiscuous mode [ 227.003077][ T9130] device hsr_slave_1 entered promiscuous mode [ 227.062731][ T24] audit: type=1400 audit(1561936559.030:38): avc: denied { associate } for pid=9125 comm="syz-executor.0" name="syz0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 [ 227.095680][ T9133] team0: Port device team_slave_1 added [ 227.136357][ T9142] chnl_net:caif_netlink_parms(): no params data found [ 227.209423][ T9128] 8021q: adding VLAN 0 to HW filter on device bond0 23:15:59 executing program 0: r0 = timerfd_create(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x268, 0x0, 0x0, 0x0, 0x3ce}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x810, r0, 0x0) [ 227.239675][ T24] audit: type=1400 audit(1561936559.200:39): avc: denied { create } for pid=9151 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 227.267891][ T24] audit: type=1400 audit(1561936559.230:40): avc: denied { write } for pid=9151 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 227.309819][ T24] audit: type=1400 audit(1561936559.230:41): avc: denied { read } for pid=9151 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 227.345769][ T9133] device hsr_slave_0 entered promiscuous mode 23:15:59 executing program 0: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x4, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) write$evdev(r0, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x17, 0xfdb1, 0x400}, {{}, 0x13, 0x2, 0x100000001}, {{r1, r2/1000+30000}, 0x12, 0x4, 0x7}, {{0x77359400}, 0x2, 0x8, 0x8001}, {{}, 0x3, 0x1, 0xfffffffffffffc01}], 0x78) write$selinux_attr(r0, &(0x7f0000000180)='system_u:object_r:ptchown_exec_t:s0\x00', 0x24) fchdir(r0) mkdir(&(0x7f0000000000)='./control\x00', 0x0) renameat(r0, &(0x7f0000000200)='./control\x00', r0, &(0x7f0000000280)='./file0\x00') [ 227.382760][ T9133] device hsr_slave_1 entered promiscuous mode [ 227.433586][ T9138] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.440730][ T9138] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.455812][ T9138] device bridge_slave_0 entered promiscuous mode 23:15:59 executing program 0: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x16, 0x0, 0x40002, 0x2, 0x0, 0x1}, 0x3c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, 0x0, &(0x7f0000000140)}, 0x17f) r1 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_MAP_FREEZE(0x16, &(0x7f00000013c0)=r0, 0x4) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, 0x0, &(0x7f0000000040)=""/1}, 0x18) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x101000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x3ee4) [ 227.477144][ T9138] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.495035][ T9138] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.507526][ T9138] device bridge_slave_1 entered promiscuous mode [ 227.527322][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.538466][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.554583][ T24] audit: type=1400 audit(1561936559.520:42): avc: denied { map_create } for pid=9162 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 227.555085][ T9128] 8021q: adding VLAN 0 to HW filter on device team0 [ 227.585358][ T24] audit: type=1400 audit(1561936559.540:43): avc: denied { map_read map_write } for pid=9162 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 227.656810][ T9142] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.667157][ T9142] bridge0: port 1(bridge_slave_0) entered disabled state [ 227.675214][ T9142] device bridge_slave_0 entered promiscuous mode [ 227.689350][ T9142] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.696846][ T9142] bridge0: port 2(bridge_slave_1) entered disabled state [ 227.705483][ T9142] device bridge_slave_1 entered promiscuous mode 23:15:59 executing program 0: io_setup(0x8000, &(0x7f0000000080)=0x0) io_pgetevents(r0, 0x8, 0x5, &(0x7f0000000180)=[{}, {}, {}, {}, {}], &(0x7f00000000c0)={0x77359400}, &(0x7f0000000280)={&(0x7f0000000240)={0x8}, 0x8}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000380)='./cgroup\x00\xadh\x062M\xb1\xd7\xf1G\xc6`+skc4\x89\xb0\x11\xe5\xf4\xef\x171t\x8e\xb3\xb2\x9c\x97\xcaq\x86\xcct?\x1a\xf1#\xe6\xc1\x02\xc4\a\xfd}\x0f\x90\xf6\x81\x05\x14\t~\x80p\x16\xca.\xb5\xdc\xc4\xfeEx\xa4\xcc\x88\xabg\x0f\x83\xff\xf4\x10\xf4\xb6zf\"\xd5\x11W\xb0\x8e\x7f9`X\n\xd8C\x90V\x01\xb3=\xa8\x9b\xea\x85`\xf4j-\x7f\x8b\x93\xf0N\xd3U\'\xd9\\\xdae\xecQ\xabb1\xc3\xdb\x96t\xbd\xe9\x1c\x9bhI6\xdcql\xc3\xbb\x87\xef\xc0\x80|ce\xa9\xa5\xcc?\xbd[r\xc0\x81?\xb0-\x19\x0e\xc6\x17pA2\xca\xc2l\xd8o|\xeb\xbc\xa4g\xe3\xddjf\t\xb2\xed\xc8\xfb\xd5\xf2U\x8f/\xc7I!\xc7S\n\x86W\x9e\xe7\"D\xec\xa0|\xdf\x98{\xaf\x1e\xb4\x94U\x17\x84\x03BB\x97\xe9\x19@\xb0\xfa\xc7\x8c\xe2\x96\x148\x98\xf2\'\xa1\x11U\x86\xc5{\xc9\xea\x97', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000040)='rdma.max\x00', 0x2, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)="e015829dd3e653059b2d359776d3054789dc9fdce26f7e9145530663483fd327128b8414f333bfe412c634d298edafbd07922b67b677b892ab06386a419a4d40b33b695408af4e790ea87f2057", 0x4d}], 0x268) [ 227.738043][ T9138] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.750624][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.769905][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.780377][ T9135] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.787500][ T9135] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.797488][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.810064][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.829735][ T9135] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.836868][ T9135] bridge0: port 2(bridge_slave_1) entered forwarding state [ 227.851046][ T9142] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 227.877649][ T9142] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.901517][ T9138] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 227.925447][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 227.935383][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 227.944524][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 227.953792][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 227.962194][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 227.971319][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 227.980081][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 227.988694][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 23:16:00 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0x80045104, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6_vti0\x00', 0x8000}) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40a0000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, r1, 0x600, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x20040040}, 0x0) [ 228.035382][ T9130] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.052736][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.061145][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.075484][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready 23:16:00 executing program 0: clone(0x2004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) exit(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd0\xb8\xde\xf6\x8153\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xfb\x92\xd9\x0f\x8b\xc8A\xc8\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mq\xc7\x00\x00\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/251) sendfile(r0, r1, 0x0, 0x1f3) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) write$P9_RSTATu(r1, &(0x7f0000000240)={0x89, 0x7d, 0x2, {{0x0, 0x6f, 0x81, 0x4, {0x10, 0x0, 0x6}, 0x12a00000, 0x9, 0x1, 0x1, 0x7, 'status\x00', 0x7, 'md5sum{', 0x7, 'status\x00', 0x27, 'trustedbdev](em1selfselinuxvboxnet0eth1'}, 0x5, 'ppp1[', r2, r3, r4}}, 0x89) [ 228.085100][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.115718][ T9128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.168039][ T9142] team0: Port device team_slave_0 added [ 228.185210][ T9138] team0: Port device team_slave_0 added [ 228.196761][ T9142] team0: Port device team_slave_1 added 23:16:00 executing program 0: clone(0x2004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='status\x00') getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, 0x0, 0x0) exit(0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000340)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd0\xb8\xde\xf6\x8153\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xfb\x92\xd9\x0f\x8b\xc8A\xc8\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mq\xc7\x00\x00\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/251) sendfile(r0, r1, 0x0, 0x1f3) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000200)=0xe8) write$P9_RSTATu(r1, &(0x7f0000000240)={0x89, 0x7d, 0x2, {{0x0, 0x6f, 0x81, 0x4, {0x10, 0x0, 0x6}, 0x12a00000, 0x9, 0x1, 0x1, 0x7, 'status\x00', 0x7, 'md5sum{', 0x7, 'status\x00', 0x27, 'trustedbdev](em1selfselinuxvboxnet0eth1'}, 0x5, 'ppp1[', r2, r3, r4}}, 0x89) [ 228.219443][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.233034][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.243332][ T9138] team0: Port device team_slave_1 added [ 228.305641][ T9142] device hsr_slave_0 entered promiscuous mode [ 228.323212][ T9142] device hsr_slave_1 entered promiscuous mode [ 228.374942][ T9130] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.409637][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.418570][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.427163][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.434251][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.443629][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.504233][ T9138] device hsr_slave_0 entered promiscuous mode [ 228.542720][ T9138] device hsr_slave_1 entered promiscuous mode [ 228.602051][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.610822][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.619496][ T17] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.626587][ T17] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.634288][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 228.643263][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 228.653664][ T9128] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 228.670889][ T9133] 8021q: adding VLAN 0 to HW filter on device bond0 [ 228.715558][ T9130] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 228.726204][ T9130] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 228.738135][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 228.749566][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 228.758382][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 228.767367][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 228.776013][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.784443][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.793348][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.801613][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.809967][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 228.818120][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 228.832183][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 228.840319][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 228.862013][ T9133] 8021q: adding VLAN 0 to HW filter on device team0 [ 228.899627][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 228.909982][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 228.919442][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 228.926544][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 228.934476][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 228.943169][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 228.951488][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 228.959357][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.968488][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.978605][ T9130] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.016920][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.028976][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.041259][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.077047][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.085046][ T24] audit: type=1400 audit(1561936561.040:44): avc: denied { create } for pid=9193 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 229.121029][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.129881][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.168281][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.181793][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 229.190396][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 229.219269][ T9133] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.241052][ T9133] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 229.284842][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 229.300092][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 229.319779][ T9142] 8021q: adding VLAN 0 to HW filter on device bond0 23:16:01 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000340)={0x1, 0x8, 0x209e20, 0x8000000001}, 0x2c) bpf$MAP_CREATE(0x2, &(0x7f0000003000)={0x3, 0x4, 0x77fffb, 0x0, 0x820000, 0x0, 0x1a0, [], 0x0, 0xffffffffffffffff, 0x0, 0x20000000000}, 0x3c) [ 229.385805][ T9133] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 229.423469][ T9138] 8021q: adding VLAN 0 to HW filter on device bond0 [ 229.430845][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready 23:16:01 executing program 2: timer_create(0x8, 0x0, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x40000, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffff9c, 0x84, 0x73, &(0x7f00000000c0)={0x0, 0xff, 0x30, 0x1ff, 0x1}, &(0x7f0000000100)=0x18) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000140)={r1, 0x101, 0x2}, 0x8) timer_gettime(0x0, &(0x7f0000000040)) [ 229.464204][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.489490][ T9142] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.538253][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.560825][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.565877][ T24] audit: type=1400 audit(1561936561.530:45): avc: denied { wake_alarm } for pid=9216 comm="syz-executor.2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 229.581647][ T9139] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.601582][ T9139] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.624837][ T9138] 8021q: adding VLAN 0 to HW filter on device team0 [ 229.632632][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.640597][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.669024][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.679310][ T9139] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.686448][ T9139] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.710954][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.730453][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 229.738693][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 229.781893][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 229.797421][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 229.808717][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 229.817412][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 229.824512][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 229.832172][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 229.840941][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 229.849418][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 229.856513][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 229.864435][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 229.873308][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 229.881704][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 229.890101][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 229.898533][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 229.908239][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 229.916190][ T12] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 229.956954][ T9142] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 229.979308][ T9142] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 229.993837][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 230.005959][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 230.014687][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 230.023627][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 230.032050][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 230.040528][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.048822][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.057367][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.065596][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.074020][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 230.081725][ T17] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 230.110466][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 230.118926][ T9139] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 230.134625][ T9142] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.160525][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 230.173848][ T9135] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 230.186416][ T9138] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:16:02 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, r0}, 0x3c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000040)) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000080)) [ 230.221884][ T9138] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 230.390805][ T24] audit: type=1400 audit(1561936562.350:46): avc: denied { map } for pid=9243 comm="syz-executor.5" path="/dev/cachefiles" dev="devtmpfs" ino=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 [ 230.421438][ C0] hrtimer: interrupt took 44760 ns [ 230.546716][ T9251] SELinux: duplicate or incompatible mount options [ 230.660120][ T9255] SELinux: duplicate or incompatible mount options 23:16:02 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000c00)="8c0a21f4faeb5d3da5c159a57062ad9ac234003b95737a7b2a4c857ff86e5b5ff03974cf528525f9e68a4d4ea324974e1288e1c2ae7fe076ee4b9f4f689219a1b4ae877a25e1e6c4c2b78c43444d0c8d1549fff8f775e7308c3add65c7bb1b22229037c7fa587a78046a8a52240c514ecef129699f133c5d26915029f3320311549bd4a95c2f3fae6082d1de16f11f05e7da3ae2ddbec946f0539ea1e5b47ff7ce4e5b9a4a4479ace512e15f9dd867edda590cd5cddfff0a65669801ae5555ab") umount2(&(0x7f0000000cc0)='./file0\x00', 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000d00)={[{0x7, 0x100000001, 0x6, 0x1, 0xffffffff, 0x9c66, 0x3, 0x80000001, 0xfff, 0x1, 0x4, 0x101, 0x8}, {0x100000001, 0x6, 0x6, 0x2, 0x3, 0x8, 0x29f, 0x2, 0x0, 0x1000, 0x9, 0x6b7, 0xfff}, {0xfffffffffffffffa, 0x100000000, 0x800, 0x9, 0xff, 0x200, 0x5, 0x85, 0x6, 0xffffffff, 0xdf, 0x50000, 0x3}], 0x200}) keyctl$read(0xb, r2, &(0x7f0000000d80)=""/74, 0x4a) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/udmabuf\x00', 0x2) 23:16:02 executing program 0: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x3e, &(0x7f00000000c0)=0x7, 0x4) bind$llc(r0, &(0x7f0000000000), 0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x200000, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) sendmmsg(r0, &(0x7f00000001c0), 0x400000000000150, 0x0) 23:16:02 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x0) pwritev(r0, &(0x7f00000015c0)=[{&(0x7f0000000200)="778e93b729c6bb", 0x7}], 0x1, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$P9_RWSTAT(r0, &(0x7f0000000180)={0x7}, 0x7) 23:16:02 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x10000, 0x0) socket$pppoe(0x18, 0x1, 0x0) write$9p(r1, &(0x7f0000000300)="56edb2b3223c477c36c5b518e2eacf474f8397b4706de7c2dbe77bd69b85f3faa06afb4a8366bcc596f1c920cd613bcc8ce3e935e113f96427a00927944e45a263139e22fe71fae124c7509d8d366dd6f748f0e4c24d2d3e93686d81f31278f63103ed16be94de0af35cb34009b89bae14764dbbdd6f1ead2b566aef18dc1ba1dafb7d3e6c0dd328ec", 0x41d) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f0000000000)) bind$alg(r0, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x110) r3 = accept4$alg(r0, 0x0, 0x0, 0x0) io_setup(0x0, &(0x7f0000000400)=0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x106, 0xe}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r2, &(0x7f0000000240)={0xa, 0x4, 0xfa00, {r5}}, 0xc) io_submit(r4, 0x1, &(0x7f0000001440)=[&(0x7f0000000200)={0x0, 0x0, 0x700000000000000, 0x0, 0xfffffffffffffffe, r3, &(0x7f00000000c0)=',', 0x1}]) 23:16:02 executing program 5: setrlimit(0x8, &(0x7f000000a000)={0xfffffffffffffffe, 0xfffffffffffffffe}) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) tkill(r0, 0xa) 23:16:02 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)={0x12, 0x2, 0x4, 0x417, 0x0, r0}, 0x3c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) ioctl$VIDIOC_G_STD(r1, 0x80085617, &(0x7f0000000040)) ioctl$PPPIOCGDEBUG(r1, 0x80047441, &(0x7f0000000080)) 23:16:02 executing program 3: r0 = perf_event_open(&(0x7f0000000600)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x2, 0x2) getsockname(0xffffffffffffff9c, &(0x7f00000029c0)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002a40)=0x80) sendmsg$nl_route(r3, &(0x7f0000002b00)={&(0x7f0000000040), 0xc, &(0x7f0000002ac0)={&(0x7f0000002a80)=@getstats={0x1c, 0x5e, 0x310, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, 0x3}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000890}, 0x20004000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x83051, r2, 0x0) 23:16:02 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f00000001c0)='ppp1+vmnet0usersystemsecurityvmnet0$ppp1vmnet\xc9^\xd0\xb9nD\xd70vmnet\xe0\xf5q\xb1ix_acl_access\x00', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') close(r1) 23:16:02 executing program 1: r0 = socket$inet(0x2, 0x4000020000000001, 0x0) sendto$inet(r0, 0x0, 0x100000122, 0x8000, &(0x7f0000000600)={0x2, 0x4e20, @local}, 0xfffffffffffffe17) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$BLKRRPART(r1, 0x125f, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x2d, &(0x7f0000000080)=""/61, &(0x7f0000000100)=0x3d) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f00000014c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$VHOST_SET_LOG_BASE(r3, 0x4008af04, &(0x7f0000000540)=&(0x7f0000000500)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x800000000000000, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xfffffffffffffd24, &(0x7f00000000c0)=0x0) io_pgetevents(r4, 0xc6, 0x7, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}], &(0x7f0000000140)={0x77359400}, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000400)={0x0, @in={{0x2, 0x4e23, @multicast2}}}, &(0x7f00000004c0)=0x84) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, 0x0, 0x0) ioctl$KVM_SET_IDENTITY_MAP_ADDR(r2, 0x4008ae48, &(0x7f0000000240)=0xf000) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r1, 0x84, 0x20, &(0x7f0000000580), &(0x7f00000005c0)=0x4) socketpair(0x8000000000001e, 0x4, 0x0, &(0x7f0000004a00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_S_EXT_CTRLS(r1, 0xc0205648, &(0x7f00000003c0)={0xbf0000, 0x4bc, 0x0, [], &(0x7f0000000200)={0x990966, 0x5, [], @string=&(0x7f0000000180)=0x3}}) sendmmsg$alg(r5, &(0x7f0000236fc8)=[{0x8000000, 0x0, &(0x7f00000fff80), 0xc, &(0x7f00001e1e78)}], 0x4924924924926c8, 0x0) 23:16:02 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_MSRS(r2, 0xc008ae88, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000000000080040000000300000000000000000000ab058e0fb474cb2d7a14fde147bcbaddd57232e08c59fa35c058d4a05404a4096b939259ea78d5edfdfa015896aad6c13345cfd77e91bc0e40d13a99400e3cd0"]) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x4) ioctl$SG_GET_LOW_DMA(r3, 0x227a, &(0x7f0000000240)) r4 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r5 = open$dir(0x0, 0x0, 0x0) write(r4, &(0x7f0000000600)="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", 0x200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_GSI_ROUTING(0xffffffffffffffff, 0x4008ae6a, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000200)={0xffffffffffffffff}, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r4, &(0x7f00000002c0)={0x15, 0x110, 0xfa00, {r6, 0x2, 0x0, 0x0, 0x0, @in6={0xa, 0x4e24, 0x81, @remote, 0x3f}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) write$RDMA_USER_CM_CMD_DISCONNECT(r4, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, 0x0, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) sendfile(r4, r7, 0x0, 0xa198) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@mcast2, @in6=@initdev}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000140)=0xe8) [ 230.926945][ T9278] SELinux: duplicate or incompatible mount options 23:16:03 executing program 3: syz_emit_ethernet(0x140, &(0x7f0000000000)={@local, @random="015248b3a95b", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x132, 0x0, 0x0, 0x0, 0xf401, 0x0, @remote={0xac, 0x1c}, @local}, @igmp={0x0, 0x0, 0x0, @broadcast}}}}}, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x10080) fcntl$getflags(r0, 0xb) bind$rxrpc(r0, &(0x7f0000000080)=@in4={0x21, 0x1, 0x2, 0x10, {0x2, 0x4e21, @multicast2}}, 0x24) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000100)=0x1, 0x4) [ 231.134989][ T9292] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. 23:16:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000c00)="8c0a21f4faeb5d3da5c159a57062ad9ac234003b95737a7b2a4c857ff86e5b5ff03974cf528525f9e68a4d4ea324974e1288e1c2ae7fe076ee4b9f4f689219a1b4ae877a25e1e6c4c2b78c43444d0c8d1549fff8f775e7308c3add65c7bb1b22229037c7fa587a78046a8a52240c514ecef129699f133c5d26915029f3320311549bd4a95c2f3fae6082d1de16f11f05e7da3ae2ddbec946f0539ea1e5b47ff7ce4e5b9a4a4479ace512e15f9dd867edda590cd5cddfff0a65669801ae5555ab") umount2(&(0x7f0000000cc0)='./file0\x00', 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000d00)={[{0x7, 0x100000001, 0x6, 0x1, 0xffffffff, 0x9c66, 0x3, 0x80000001, 0xfff, 0x1, 0x4, 0x101, 0x8}, {0x100000001, 0x6, 0x6, 0x2, 0x3, 0x8, 0x29f, 0x2, 0x0, 0x1000, 0x9, 0x6b7, 0xfff}, {0xfffffffffffffffa, 0x100000000, 0x800, 0x9, 0xff, 0x200, 0x5, 0x85, 0x6, 0xffffffff, 0xdf, 0x50000, 0x3}], 0x200}) keyctl$read(0xb, r2, &(0x7f0000000d80)=""/74, 0x4a) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/udmabuf\x00', 0x2) 23:16:03 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) finit_module(r0, &(0x7f00000001c0)='ppp1+vmnet0usersystemsecurityvmnet0$ppp1vmnet\xc9^\xd0\xb9nD\xd70vmnet\xe0\xf5q\xb1ix_acl_access\x00', 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip_tables_targets\x00') close(r1) [ 231.458489][ T9309] SELinux: duplicate or incompatible mount options 23:16:03 executing program 0: r0 = socket$inet6(0xa, 0x5, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shutdown(r0, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x81, 0x2) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000080)={0x9, 0x721c, 0x1, 0x0, 0x9, 0xfffffffffffffffc, 0x5, 0xffffffff82ac8e76, 0x0}, &(0x7f00000000c0)=0x20) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000100)={r2, 0x6}, 0x8) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x20, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x380000, @loopback}, 0x1c) 23:16:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'syz_tun\x00'}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$sock_x25_SIOCADDRT(r2, 0x890b, &(0x7f00000003c0)={@remote={[], 0x1}, 0x5, 'team_slave_1\x00'}) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800b5055e0bcfe87b0071") recvmmsg(r1, &(0x7f0000000180)=[{{&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000100)=""/81, 0x51}, 0x1f}], 0x1, 0x100, &(0x7f00000001c0)) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x1, 0x400, 0x8, 0x100000001, 0x7, 0x200, 0xfff, {0x0, @in6={{0xa, 0x4e22, 0x0, @dev={0xfe, 0x80, [], 0xf}, 0x9}}, 0x4, 0x46b4, 0x8, 0x8000, 0x3}}, &(0x7f0000000300)=0xb0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r3, 0x84, 0x65, &(0x7f0000000080)=[@in6={0xa, 0x4e24, 0x81, @loopback, 0x3}], 0x1c) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f00000004c0)={r4, @in6={{0xa, 0x4e20, 0x4, @empty, 0x2d}}, 0x3db1, 0x8}, 0x90) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000340)=@sack_info={r4, 0x1f, 0x2}, 0xc) 23:16:03 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000002c0)={0x80, 0xfffffffffffffe01, 0xc67, 0x3a0, 0x1}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000500)={0x1f, {0x4e35, 0x2, 0x942e, 0x6, 0x2, 0x6}, 0xffffffff}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) listen(0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(0x0, 0x0, 0x0) eventfd(0x9) fsetxattr$security_ima(r3, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "3e0c3904120b51bbe0e8278ea81a2318"}, 0x11, 0x2) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCSTI(r4, 0x40186f40, 0x712a02) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e21, @loopback}, 0x70d2f663) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000001c0)=0x68) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000580)={0x7fffffff, 0x0, {0x3, 0xe, 0xffffffff80000000, 0x3, 0x7ffd}}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000380)={@local}) stat(&(0x7f0000000400)='./file0/file0\x00', 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f00000003c0)={0x0, 0xa74e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', r6}) 23:16:03 executing program 5: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0xa00000000000000, 0x80, &(0x7f0000000040)=@broute={'broute\x00', 0x20, 0x1, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[]}, 0x78) 23:16:03 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000c00)="8c0a21f4faeb5d3da5c159a57062ad9ac234003b95737a7b2a4c857ff86e5b5ff03974cf528525f9e68a4d4ea324974e1288e1c2ae7fe076ee4b9f4f689219a1b4ae877a25e1e6c4c2b78c43444d0c8d1549fff8f775e7308c3add65c7bb1b22229037c7fa587a78046a8a52240c514ecef129699f133c5d26915029f3320311549bd4a95c2f3fae6082d1de16f11f05e7da3ae2ddbec946f0539ea1e5b47ff7ce4e5b9a4a4479ace512e15f9dd867edda590cd5cddfff0a65669801ae5555ab") umount2(&(0x7f0000000cc0)='./file0\x00', 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000d00)={[{0x7, 0x100000001, 0x6, 0x1, 0xffffffff, 0x9c66, 0x3, 0x80000001, 0xfff, 0x1, 0x4, 0x101, 0x8}, {0x100000001, 0x6, 0x6, 0x2, 0x3, 0x8, 0x29f, 0x2, 0x0, 0x1000, 0x9, 0x6b7, 0xfff}, {0xfffffffffffffffa, 0x100000000, 0x800, 0x9, 0xff, 0x200, 0x5, 0x85, 0x6, 0xffffffff, 0xdf, 0x50000, 0x3}], 0x200}) keyctl$read(0xb, r2, &(0x7f0000000d80)=""/74, 0x4a) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000e00)='/dev/udmabuf\x00', 0x2) 23:16:03 executing program 5: vmsplice(0xffffffffffffffff, 0x0, 0xfffffffffffffeaa, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000480)=[{{0x0, 0xfffffef0, 0x0, 0xffffffffffffffe8, 0x0, 0x431}}], 0x1, 0x100, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x10100, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r2, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000200)={0x6, 0x0, [0x4, 0x3ff, 0x2], 0x9d}) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x80) fsetxattr$security_selinux(r0, &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:net_conf_t:s0\x00', 0x20, 0x2) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000440)) futimesat(r3, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={{r5, r6/1000+10000}, {0x77359400}}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x7, 0x7fffffff, 0x3, 0x3, 0x4}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000003c0)={r8, 0x28, "1dcf08343ec1c5c3ebb2c2267afe774c8540112138345c8a9371f8af0c84e4cd86d202f18c73c77c"}, &(0x7f0000000400)=0x30) write(r7, &(0x7f0000000380), 0xfffffffe) [ 231.941682][ T9333] SELinux: duplicate or incompatible mount options 23:16:04 executing program 0: [ 232.104677][ T9336] ubi0: attaching mtd0 23:16:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000c00)="8c0a21f4faeb5d3da5c159a57062ad9ac234003b95737a7b2a4c857ff86e5b5ff03974cf528525f9e68a4d4ea324974e1288e1c2ae7fe076ee4b9f4f689219a1b4ae877a25e1e6c4c2b78c43444d0c8d1549fff8f775e7308c3add65c7bb1b22229037c7fa587a78046a8a52240c514ecef129699f133c5d26915029f3320311549bd4a95c2f3fae6082d1de16f11f05e7da3ae2ddbec946f0539ea1e5b47ff7ce4e5b9a4a4479ace512e15f9dd867edda590cd5cddfff0a65669801ae5555ab") umount2(&(0x7f0000000cc0)='./file0\x00', 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000d00)={[{0x7, 0x100000001, 0x6, 0x1, 0xffffffff, 0x9c66, 0x3, 0x80000001, 0xfff, 0x1, 0x4, 0x101, 0x8}, {0x100000001, 0x6, 0x6, 0x2, 0x3, 0x8, 0x29f, 0x2, 0x0, 0x1000, 0x9, 0x6b7, 0xfff}, {0xfffffffffffffffa, 0x100000000, 0x800, 0x9, 0xff, 0x200, 0x5, 0x85, 0x6, 0xffffffff, 0xdf, 0x50000, 0x3}], 0x200}) keyctl$read(0xb, r2, &(0x7f0000000d80)=""/74, 0x4a) 23:16:04 executing program 1: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000140)=0xe8) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000340)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x27, 0x27, 0x3, [@typedef={0x10}, @datasec={0x6, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x5, 0x14cf}], "21b25f"}]}, {0x0, [0x0]}}, &(0x7f00000003c0)=""/205, 0x43, 0xcd, 0x1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x8, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="850000006b000000460a000000f40000950000f1ff000000"], &(0x7f0000000080)='GPL\x00\x8d\at\xce\xb0\xac\xe42\x0f\xd3\x86\x92\xcd\xc9\x82SO \x8b(\x0eB\xca\x940\xb19\xd4\x17;WK\x87y\x91L\xb2\xaaR\xdb\xeaqm&\xc9Zl\xa4\x16\xdf\x9d\xeao$\x84\xc66\xe1\xd3\xf6\xeca\xc0&uCY\x9c#\xe7\x16=]\x91Q\x8d\xe4\x8e\xf9]0\x11\xfa\xb6\xdd\x9a\x9c \xda\x17\x84l\xf6\xdd\x18H-^y\xd3ke\x81\xa4-Kp\xd1\xa9/l\x10R\xdaS\xcb\x0f\\\vs,\xa8\x88H\x1c\x85\x93\xfc\xf0\t\x95\xb4\xf9%\xf3\x1f+\xc9\x13\xe2\xfb', 0x4, 0x99, &(0x7f0000000180)=""/153, 0x0, 0x0, [], r0, 0x0, r1, 0x8, 0x0, 0xf7, 0x10, 0x0}, 0xfffffffffffffe0f) 23:16:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x2000) setresgid(0x0, 0xee00, 0x0) r1 = getegid() setgroups(0x2, &(0x7f0000000340)=[0x0, r1]) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f00000000c0)) signalfd(r2, &(0x7f0000000100)={0x6}, 0x8) [ 232.308729][ T9336] ubi0: scanning is finished [ 232.333852][ T9356] SELinux: duplicate or incompatible mount options [ 232.345573][ T9336] ubi0: empty MTD device detected [ 232.386792][ T24] audit: type=1400 audit(1561936564.350:47): avc: denied { associate } for pid=9346 comm="syz-executor.5" name="ptmx" dev="devtmpfs" ino=16384 scontext=system_u:object_r:net_conf_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 23:16:04 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0xff, 0x608200) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x5, 0x4) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@filter={'filter\x00', 0xe, 0x1, 0xa28, [0x0, 0x200005c0, 0x200005f0, 0x20000fb8], 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="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"]}, 0xaf6) 23:16:04 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000c00)="8c0a21f4faeb5d3da5c159a57062ad9ac234003b95737a7b2a4c857ff86e5b5ff03974cf528525f9e68a4d4ea324974e1288e1c2ae7fe076ee4b9f4f689219a1b4ae877a25e1e6c4c2b78c43444d0c8d1549fff8f775e7308c3add65c7bb1b22229037c7fa587a78046a8a52240c514ecef129699f133c5d26915029f3320311549bd4a95c2f3fae6082d1de16f11f05e7da3ae2ddbec946f0539ea1e5b47ff7ce4e5b9a4a4479ace512e15f9dd867edda590cd5cddfff0a65669801ae5555ab") umount2(&(0x7f0000000cc0)='./file0\x00', 0x0) ioctl$KVM_SET_PIT2(r0, 0x4070aea0, &(0x7f0000000d00)={[{0x7, 0x100000001, 0x6, 0x1, 0xffffffff, 0x9c66, 0x3, 0x80000001, 0xfff, 0x1, 0x4, 0x101, 0x8}, {0x100000001, 0x6, 0x6, 0x2, 0x3, 0x8, 0x29f, 0x2, 0x0, 0x1000, 0x9, 0x6b7, 0xfff}, {0xfffffffffffffffa, 0x100000000, 0x800, 0x9, 0xff, 0x200, 0x5, 0x85, 0x6, 0xffffffff, 0xdf, 0x50000, 0x3}], 0x200}) 23:16:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x2000) setresgid(0x0, 0xee00, 0x0) r1 = getegid() setgroups(0x2, &(0x7f0000000340)=[0x0, r1]) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f00000000c0)) signalfd(r2, &(0x7f0000000100)={0x6}, 0x8) 23:16:04 executing program 3: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$setperm(0x5, r0, 0x2000) setresgid(0x0, 0xee00, 0x0) r1 = getegid() setgroups(0x2, &(0x7f0000000340)=[0x0, r1]) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) quotactl(0x0, 0x0, 0x0, 0x0) bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) setresuid(0x0, 0xfffe, 0xffffffffffffffff) keyctl$revoke(0x3, r0) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x0, 0x0) ioctl$SG_GET_NUM_WAITING(r3, 0x227d, &(0x7f00000000c0)) signalfd(r2, &(0x7f0000000100)={0x6}, 0x8) [ 232.750976][ T9379] SELinux: duplicate or incompatible mount options [ 233.048573][ T9336] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 233.137665][ T9354] ubi0: attaching mtd0 [ 233.164762][ T9354] ubi0: scanning is finished 23:16:05 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000002c0)={0x80, 0xfffffffffffffe01, 0xc67, 0x3a0, 0x1}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000500)={0x1f, {0x4e35, 0x2, 0x942e, 0x6, 0x2, 0x6}, 0xffffffff}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) listen(0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(0x0, 0x0, 0x0) eventfd(0x9) fsetxattr$security_ima(r3, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "3e0c3904120b51bbe0e8278ea81a2318"}, 0x11, 0x2) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCSTI(r4, 0x40186f40, 0x712a02) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e21, @loopback}, 0x70d2f663) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000001c0)=0x68) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000580)={0x7fffffff, 0x0, {0x3, 0xe, 0xffffffff80000000, 0x3, 0x7ffd}}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000380)={@local}) stat(&(0x7f0000000400)='./file0/file0\x00', 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f00000003c0)={0x0, 0xa74e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', r6}) 23:16:05 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0xc, 0x4, &(0x7f0000346fc8)=ANY=[@ANYBLOB="180000000070e56d0f500000000010950000000000d800000000000004000800"], &(0x7f0000f6bffb)='GPL\x00'}, 0x48) 23:16:05 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0x400000000088, 0x3a4, 0x8000000001}, 0x3c) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820005, 0x0}, 0x2c) r1 = socket$inet(0x2, 0x7, 0x9) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000080)={0x0, 0x3}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000100)={r2, 0x100000001}, 0x8) bpf$MAP_CREATE(0x2, &(0x7f0000000040)={0x3, 0x0, 0x403618, 0x0, 0x20820000, r0}, 0x2c) 23:16:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000c00)="8c0a21f4faeb5d3da5c159a57062ad9ac234003b95737a7b2a4c857ff86e5b5ff03974cf528525f9e68a4d4ea324974e1288e1c2ae7fe076ee4b9f4f689219a1b4ae877a25e1e6c4c2b78c43444d0c8d1549fff8f775e7308c3add65c7bb1b22229037c7fa587a78046a8a52240c514ecef129699f133c5d26915029f3320311549bd4a95c2f3fae6082d1de16f11f05e7da3ae2ddbec946f0539ea1e5b47ff7ce4e5b9a4a4479ace512e15f9dd867edda590cd5cddfff0a65669801ae5555ab") umount2(&(0x7f0000000cc0)='./file0\x00', 0x0) 23:16:05 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x0, @remote}, 0xffffffffffffffb5) getsockopt$inet_int(r0, 0x0, 0xe, 0x0, &(0x7f0000000080)=0x1) 23:16:05 executing program 5: vmsplice(0xffffffffffffffff, 0x0, 0xfffffffffffffeaa, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000480)=[{{0x0, 0xfffffef0, 0x0, 0xffffffffffffffe8, 0x0, 0x431}}], 0x1, 0x100, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, 0x0, 0x10100, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x12, r2, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000200)={0x6, 0x0, [0x4, 0x3ff, 0x2], 0x9d}) r3 = syz_open_procfs(0x0, &(0x7f00000001c0)='sched\x00') r4 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r4, 0x80) fsetxattr$security_selinux(r0, &(0x7f00000002c0)='security.selinux\x00', &(0x7f0000000300)='system_u:object_r:net_conf_t:s0\x00', 0x20, 0x2) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000440)) futimesat(r3, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180)={{r5, r6/1000+10000}, {0x77359400}}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x7, 0x7fffffff, 0x3, 0x3, 0x4}, &(0x7f0000000380)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f00000003c0)={r8, 0x28, "1dcf08343ec1c5c3ebb2c2267afe774c8540112138345c8a9371f8af0c84e4cd86d202f18c73c77c"}, &(0x7f0000000400)=0x30) write(r7, &(0x7f0000000380), 0xfffffffe) [ 233.221933][ T9354] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 [ 233.280139][ T24] audit: type=1400 audit(1561936565.240:48): avc: denied { prog_load } for pid=9401 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 23:16:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000300)={0x2}) r3 = semget$private(0x0, 0x0, 0x489) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000040)={{{@in=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@local}}, &(0x7f0000000180)=0xe8) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000740)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f0000000900)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x40000003}, 0xc, &(0x7f00000008c0)={&(0x7f0000000780)=ANY=[@ANYBLOB="170000", @ANYRES16=r5, @ANYBLOB="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"], 0x140}, 0x1, 0x0, 0x0, 0x800}, 0x4000) ioctl$VIDIOC_SUBDEV_G_EDID(r0, 0xc0285628, &(0x7f00000009c0)={0x0, 0x40, 0x5, [], &(0x7f0000000980)}) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000940)=0x343) r6 = getegid() r7 = getuid() getresgid(&(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240)=0x0) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000280)={{0x4, r4, r6, r7, r8, 0x4, 0x9}, 0xff, 0x3, 0x2}) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000580)='vfat\x00', &(0x7f00000005c0)='./file0\x00', 0x1000, 0x1, &(0x7f00000006c0)=[{&(0x7f0000000600)="4cb454ed9590583fd52011246217d04285a8170ec666345d016e3ca8502f9a3b4a29c2a54dd48894f3b239cc1241bffc35f64be4e66552b9cb6f541484e25175f685842cdecf4f9f156823d685446ccc3079d5f32a211e0ec118a12557fec4a5f219ef291dbab4e3b445219733a9d3154344aeff95a1f6d2bb7f4bbf024a2f7f5cb7706f005b64d2b95e374e", 0x8c, 0x4}], 0x200000, 0x0) r10 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$chown(0x4, r10, r4, r9) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') fsetxattr$security_smack_transmute(r0, &(0x7f0000000500)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000540)='TRUE', 0x4, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4020}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x14, r11, 0x2, 0x70bd28, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4040010}, 0x800) socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000340)={0x9, 0x8001, 0x1, 0x7, 0x1}, 0x14) ioctl$CAPI_REGISTER(0xffffffffffffffff, 0x400c4301, 0x0) finit_module(r1, 0x0, 0x0) ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, 0x0) unshare(0x40000000) 23:16:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getpeername$inet6(r0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) open(0x0, 0x80, 0xc1) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0xfffffffffffffdbf) close(0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) times(0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000010, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 233.398148][ T9412] SELinux: duplicate or incompatible mount options [ 233.531283][ T9413] ubi0: attaching mtd0 [ 233.562349][ C0] sched: DL replenish lagged too much [ 233.631644][ T9429] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 233.642044][ T9423] FAT-fs (loop0): invalid media value (0xa8) [ 233.659010][ T9423] FAT-fs (loop0): Can't find a valid FAT filesystem 23:16:05 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x4000001000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010600"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e08000000000c00020208b12b8f00164000"], 0x3c}}, 0x0) 23:16:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000c00)="8c0a21f4faeb5d3da5c159a57062ad9ac234003b95737a7b2a4c857ff86e5b5ff03974cf528525f9e68a4d4ea324974e1288e1c2ae7fe076ee4b9f4f689219a1b4ae877a25e1e6c4c2b78c43444d0c8d1549fff8f775e7308c3add65c7bb1b22229037c7fa587a78046a8a52240c514ecef129699f133c5d26915029f3320311549bd4a95c2f3fae6082d1de16f11f05e7da3ae2ddbec946f0539ea1e5b47ff7ce4e5b9a4a4479ace512e15f9dd867edda590cd5cddfff0a65669801ae5555ab") [ 233.691937][ T24] audit: type=1400 audit(1561936565.650:49): avc: denied { map } for pid=9402 comm="syz-executor.5" path="/selinux/policy" dev="selinuxfs" ino=20 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=file permissive=1 [ 233.716567][ T9433] IPVS: ftp: loaded support on port[0] = 21 [ 233.736962][ T9413] ubi0: scanning is finished 23:16:05 executing program 5: r0 = socket$inet(0x2, 0x80001, 0x84) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e22, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000006000)=@in={0x2, 0x4e20, @loopback}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000080)="8d", 0x1}], 0x1}, 0x0) shutdown(r0, 0x1) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x6b, &(0x7f0000000140), 0x14) [ 233.938806][ T9444] SELinux: duplicate or incompatible mount options 23:16:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getpeername$inet6(r0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) open(0x0, 0x80, 0xc1) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0xfffffffffffffdbf) close(0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) times(0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000010, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 234.159900][ T9457] FAT-fs (loop0): invalid media value (0xa8) [ 234.166336][ T9457] FAT-fs (loop0): Can't find a valid FAT filesystem [ 234.207164][ T9423] IPVS: ftp: loaded support on port[0] = 21 [ 234.273117][ T9413] ubi0 error: ubi_attach_mtd_dev: cannot spawn "ubi_bgt0d", error -4 23:16:06 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000002c0)={0x80, 0xfffffffffffffe01, 0xc67, 0x3a0, 0x1}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000500)={0x1f, {0x4e35, 0x2, 0x942e, 0x6, 0x2, 0x6}, 0xffffffff}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) listen(0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(0x0, 0x0, 0x0) eventfd(0x9) fsetxattr$security_ima(r3, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "3e0c3904120b51bbe0e8278ea81a2318"}, 0x11, 0x2) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCSTI(r4, 0x40186f40, 0x712a02) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e21, @loopback}, 0x70d2f663) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000001c0)=0x68) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000580)={0x7fffffff, 0x0, {0x3, 0xe, 0xffffffff80000000, 0x3, 0x7ffd}}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000380)={@local}) stat(&(0x7f0000000400)='./file0/file0\x00', 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f00000003c0)={0x0, 0xa74e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', r6}) 23:16:06 executing program 1: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000000)='/dev/capi20\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x6, 0x0) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000140)) r2 = getuid() r3 = getegid() write$FUSE_ATTR(r1, &(0x7f00000000c0)={0x78, 0x0, 0x3, {0x2, 0x7, 0x0, {0x2, 0x1, 0x10000000000, 0x7ff000, 0x4, 0x2, 0xfffffffffffffffd, 0x254f, 0x1, 0x8, 0x2, r2, r3, 0x5, 0x8}}}, 0x78) r4 = dup(r0) read$rfkill(r4, 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) 23:16:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') openat$uhid(0xffffffffffffff9c, &(0x7f0000000bc0)='/dev/uhid\x00', 0x0, 0x0) 23:16:06 executing program 5: socket(0x10, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xff, 0x0) getgroups(0x8, &(0x7f0000000140)=[0xffffffffffffffff, 0xee01, 0xee00, 0xee01, 0xee01, 0x0, 0xffffffffffffffff, 0xee01]) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) r3 = geteuid() ioprio_get$uid(0x0, r3) fcntl$setown(r2, 0x8, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) gettid() fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) chdir(0x0) 23:16:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) mmap$binder(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4={[0x0, 0x0, 0x4603000000000000]}}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r1, &(0x7f0000000100), 0x135, 0x68) 23:16:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getpeername$inet6(r0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) open(0x0, 0x80, 0xc1) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0xfffffffffffffdbf) close(0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) times(0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000010, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 234.480628][ T24] audit: type=1400 audit(1561936566.440:50): avc: denied { map } for pid=9473 comm="syz-executor.0" path="socket:[31311]" dev="sockfs" ino=31311 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=udp_socket permissive=1 23:16:06 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0, 0x3a4}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mounts\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, 0x0) setsockopt$sock_void(r0, 0x1, 0x24, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) 23:16:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000480)='/dev/full\x00', 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(0xffffffffffffffff, 0x401870cc, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$sock_buf(r1, 0x1, 0x0, 0x0, &(0x7f0000000000)) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f0000000140)=0x73, 0x4) getpeername$inet6(r0, 0x0, 0x0) close(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) ioctl$UI_SET_FFBIT(0xffffffffffffffff, 0x4004556b, 0x0) open(0x0, 0x80, 0xc1) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, 0x0, 0xfffffffffffffdbf) close(0xffffffffffffffff) listen(0xffffffffffffffff, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) times(0x0) ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000010, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) [ 234.632019][ T9481] SELinux: duplicate or incompatible mount options [ 234.694261][ T9493] ubi0: attaching mtd0 [ 234.699018][ T9493] ubi0: scanning is finished 23:16:06 executing program 1: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x7e3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9f0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0xffffffffffffffff) r2 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x8, 0x5, 0x200, 0x0, 0x0, 0x0, 0xa0c30, 0x9, 0x8, 0x4980, 0x80000000, 0x3, 0x2, 0x2, 0xfffffffffffffff9, 0xfffffffffffffffb, 0x9, 0x7, 0x80000001, 0x27, 0x2, 0x7fff, 0x9, 0x4, 0x2, 0x1, 0x2, 0x0, 0x3f, 0x86, 0x9, 0x8, 0x4, 0x80000000, 0x0, 0x9, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000000), 0x5}, 0x4000, 0x9, 0x0, 0x8, 0x3, 0x4000000000000, 0x7}, r1, 0x9, r0, 0x8) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/enforce\x00', 0x10400, 0x0) setsockopt$inet_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f00000004c0)=@gcm_128={{0x304}, "29a9fcb2ec6b2a29", "d10cddfea63e23e1232387532844e5f0", "a0d1535a", "7438f5427037a771"}, 0x28) connect$pppoe(r3, &(0x7f0000000500)={0x18, 0x0, {0x7, @local, 'ip6erspan0\x00'}}, 0x1e) ioprio_set$pid(0x2, r1, 0x4) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='/group.sta\x9f\xd4t\x00+\x04J{\t\xab\v\x02t\xe1\t\x85\xa6\xfa\x15\xb3[\xa6\x94!\xf2\x04\xde\xc5f\x8a\x06\x00\x00\x00\xb9\x0f\xf8`\xe0\x1f&+\xaf\xacu\nm\\\xe2Y\xcba\xea\f\xd9DXX>\xef/\xc5\x97\xea\x93\xa7\xde\xc9\xb4\x16\x8eF\x8b\xe0Wm\x1d\x0e\xbf\x8b\xc4G\x8f\x8e\xd8[T|i$\x88\x04\x00\x00\x00\x00\x00\x00\x00\x90\x1eB\x8b\x98\xad\xd17_Q\xe15\x84\x8f\xea\x98\xc6\xe3WE\x11\xe0\xc6\x1f\xf2/\xf6\x1f', 0x2761, 0x0) getsockopt$bt_sco_SCO_CONNINFO(r4, 0x11, 0x2, &(0x7f00000002c0)=""/177, &(0x7f0000000140)=0xb1) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0x7ff, 0x1f, 0xffff, 0x7fffffff, 0x0, 0x8, 0x80020, 0x1, 0x2, 0x5c5, 0x400, 0x200, 0x1010, 0x4, 0x3, 0x7, 0x7, 0x9, 0x8000000000000, 0x4, 0x10001, 0x6, 0x40, 0x5, 0x4, 0x7f, 0x1, 0x3, 0x1, 0xc380, 0x1ff, 0xec4, 0x9396, 0x1, 0x3, 0x10001, 0x0, 0xffff, 0x1, @perf_config_ext={0x1, 0x4e8}, 0x80, 0xfffffffffffffcdc, 0xfffffffffffffffe, 0x0, 0x8, 0x80000000, 0x7}, r1, 0xc, r2, 0x9) sched_setaffinity(r1, 0x8, &(0x7f0000000380)=0x9) write$P9_RLERROR(r4, &(0x7f00000003c0)=ANY=[@ANYBLOB="9200000007010089002fe7ca2cd3702e7374619fd474002b044a7b09ab0b0274e10985a6fa15b35ba69421d904cddec5668a06000000b90ff860e01f262bafac750a6d5ce259cb61ea0cd94458583eef2fc597ea93a7dec9b4168e468bc7576d1d0ebf8bc4478f8ed85b547c6924880400000000000000901e428b98add1375f51e135848fea98c6e3574511e0c61ff22ff6"], 0xffffff67) 23:16:06 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) r2 = request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000b40)='pkcs7_test\x00', &(0x7f0000000b80)=@secondary='builtin_and_secondary_trusted\x00') 23:16:06 executing program 5: socket(0x10, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xff, 0x0) getgroups(0x8, &(0x7f0000000140)=[0xffffffffffffffff, 0xee01, 0xee00, 0xee01, 0xee01, 0x0, 0xffffffffffffffff, 0xee01]) ioctl$TUNSETGROUP(r0, 0x400454ce, r1) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = inotify_init1(0x0) r3 = geteuid() ioprio_get$uid(0x0, r3) fcntl$setown(r2, 0x8, 0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0\x00', 0x20) gettid() fcntl$getownex(r2, 0x10, &(0x7f0000000080)={0x0, 0x0}) ptrace$setopts(0x4206, r4, 0x0, 0x0) chdir(0x0) 23:16:06 executing program 3: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = creat(&(0x7f0000000200)='.\x00', 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x891d, &(0x7f0000000140)='sit0\x00') r1 = syz_open_dev$video(&(0x7f00000001c0)='/dev/video#\x00', 0x0, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x4) r2 = dup(r1) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000040)={0x0, @in={{0x2, 0x4e22, @remote}}, 0x3f, 0x4e87e8f6, 0x8a0, 0x100, 0x401}, &(0x7f0000000100)=0x98) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000140)={r3, 0xd450, 0xd1}, &(0x7f0000000180)=0x8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x8, 0x0, 0x5, 0x5, 0x0, 0x3f, 0x400c1, 0x5, 0x0, 0x9, 0x3, 0xffffffff, 0x0, 0x1000000000, 0x6, 0x20a, 0xdf, 0x3, 0x400000000000, 0x0, 0x4, 0x200, 0x100000001, 0x10001, 0x2, 0x9b, 0xd7, 0x2, 0x5, 0x6, 0x6, 0x80000000, 0x1, 0x21, 0x6, 0xfff, 0x0, 0x120000, 0x1, @perf_config_ext={0x9, 0x32251fa9}, 0x440, 0x0, 0x285, 0x5, 0x1, 0x9, 0x9}, r4, 0x4, 0xffffffffffffff9c, 0x0) [ 235.069982][ T9508] SELinux: duplicate or incompatible mount options [ 235.263893][ T9493] ubi0: attached mtd0 (name "mtdram test device", size 0 MiB) [ 235.312768][ T9493] ubi0: PEB size: 4096 bytes (4 KiB), LEB size: 3968 bytes [ 235.364875][ T9493] ubi0: min./max. I/O unit sizes: 1/64, sub-page size 1 [ 235.388675][ T9493] ubi0: VID header offset: 64 (aligned 64), data offset: 128 [ 235.405506][ T9493] ubi0: good PEBs: 32, bad PEBs: 0, corrupted PEBs: 0 [ 235.442408][ T9493] ubi0: user volume: 0, internal volumes: 1, max. volumes count: 23 [ 235.450899][ T9493] ubi0: max/mean erase counter: 1/1, WL threshold: 4096, image sequence number: 3835765407 [ 235.472364][ T9493] ubi0: available PEBs: 28, total reserved PEBs: 4, PEBs reserved for bad PEB handling: 0 23:16:07 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000002c0)={0x80, 0xfffffffffffffe01, 0xc67, 0x3a0, 0x1}) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) connect$bt_rfcomm(0xffffffffffffffff, &(0x7f0000000500)={0x1f, {0x4e35, 0x2, 0x942e, 0x6, 0x2, 0x6}, 0xffffffff}, 0xa) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x80000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) listen(0xffffffffffffffff, 0x0) r3 = syz_open_dev$usb(0x0, 0x0, 0x0) eventfd(0x9) fsetxattr$security_ima(r3, &(0x7f0000000080)='security.ima\x00', &(0x7f00000000c0)=@md5={0x1, "3e0c3904120b51bbe0e8278ea81a2318"}, 0x11, 0x2) openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000040), 0x4) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$TIOCSTI(r4, 0x40186f40, 0x712a02) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x4) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r2) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000600)={0x2, 0x4e21, @loopback}, 0x70d2f663) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, &(0x7f0000000180)) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000240), &(0x7f00000001c0)=0x68) r5 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(0xffffffffffffffff, 0xc0605345, &(0x7f0000000580)={0x7fffffff, 0x0, {0x3, 0xe, 0xffffffff80000000, 0x3, 0x7ffd}}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x89a1, &(0x7f0000000380)={@local}) stat(&(0x7f0000000400)='./file0/file0\x00', 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000080)=0x14) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_NUM(r7, 0x4008af10, &(0x7f00000003c0)={0x0, 0xa74e}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', r6}) 23:16:07 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(r0, 0xc008ae88, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dbe2156a9f89d72eeb0a97a1cce4c2fe75a2bfb5f3456da300498bb58304ab3d84d3cb3d3ff9"]) msgrcv(0x0, 0x0, 0x36e, 0x0, 0xa423ad41a879dde0) 23:16:07 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000d80)={'team_slave_1\x00'}) r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x7fff, 0x0) timerfd_create(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000900)={'TPROXY\x00'}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x81, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="89d3c667b9acfeb1216eff950eb6f3f77459c4d8fbe0ef4a76314bae70df0d37f225cf5b95be21a748ad94edf98118224cda8b3da2d211037426d9f517140598b69a283b9474797633db58", 0x4b, 0x6}, {&(0x7f00000002c0)="3ea3975c60761de06933fd819568fc28242175a20a4f6965730bd115818b93e851a884d769b15099dfcc30724604ae81395631688d4b42e35f13ed44e401bc134d91c96129e052f2", 0x48, 0x7}, {&(0x7f0000000240)="4b8bbdea671dea3b9d1c04b9f3c00884d6ec9d86b70d47b6eb6c85", 0x1b, 0x9}, {&(0x7f0000000340)="e9ee27a45f72ff90ee8d0b15f4c74a41274646fbc1e1ae74f872f87679d5583fb44bf3e106fd647cad0377c91ff86809f5cb980a04d907e7a53c8b363a48b2322ac1771f598af396121dc3ebae25b4aead5fa12921eb1424062858a1e6c0cac2a8291a22e8ef24c9b6a7af50c4691f28a80f4410036b2832069632c67ce66e2d379c7bcb7c1e1e55faf64772cf4cac0461def011e56d0d644eee44b7ac4231b244a9d6257171276b5404d9a13da567a3857304c6299a14da4ef4779f380043f6fe20296181f5", 0xc6, 0x55ed}], 0x2090000, &(0x7f0000000680)={[{@resize_size={'resize', 0x3d, 0x10001}}, {@errors_continue='errors=continue'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@grpquota='grpquota'}], [{@euid_gt={'euid>', r3}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r4}}]}) 23:16:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) request_key(&(0x7f0000000a80)='ceph\x00', &(0x7f0000000ac0)={'syz', 0x3}, &(0x7f0000000b00)='*%vmnet0vboxnet1!(^\x00', 0xffffffffffffffff) 23:16:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3, 0x1) getsockname$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000)="10", 0x1}]) [ 235.501250][ T9521] ubi0: background thread "ubi_bgt0d" started, PID 9521 23:16:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89f2, &(0x7f0000000080)='ip6tnl0\x00') ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) wait4(r1, 0x0, 0x20000000, 0x0) [ 235.603651][ T9530] SELinux: duplicate or incompatible mount options [ 235.633800][ T9539] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 23:16:07 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r0) socket$vsock_stream(0x28, 0x1, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000100)='/dev/input/mouse#\x00', 0x3, 0x1) getsockname$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, &(0x7f00000001c0)=0x1c) io_setup(0x8, &(0x7f00000000c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000040)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000)="10", 0x1}]) 23:16:07 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000a40)='/dev/cachefiles\x00', 0x60000, 0x0) [ 235.769406][ T9541] ubi: mtd0 is already attached to ubi0 [ 235.780198][ T9539] netlink: 'syz-executor.0': attribute type 6 has an invalid length. [ 235.957423][ T9560] SELinux: duplicate or incompatible mount options 23:16:08 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x4, 0x0, @remote={0xac, 0x70}, @dev}, @icmp=@parameter_prob={0x5, 0x2, 0x0, 0x0, 0x0, 0x6, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @dev}}}}}}, 0x0) r0 = semget(0x0, 0x0, 0x202) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000000)=[0x3, 0x81, 0xffffffff, 0x10001, 0x6]) 23:16:08 executing program 2: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) write$P9_RLERRORu(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="1c00000007ffff0f00"], 0x9) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB='#q'], 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend='noextend'}]}}) 23:16:08 executing program 5: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x2000400000000009, 0xfffffffffffffffc) ioctl$VIDIOC_QUERY_EXT_CTRL(r0, 0xc0585609, &(0x7f0000000240)={0x0, 0x7, "d60700002000000000000080917149fd661837b011b15f2400e59600", 0x0, 0x7f, 0x0, 0x800001, 0x2}) 23:16:08 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f0000001140)=0x10000, 0xdc) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x5, 0xffff, [0x7, 0x1f80000, 0x1c1, 0x1800000000, 0x9], 0x4}) 23:16:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000a00)) 23:16:08 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000d80)={'team_slave_1\x00'}) r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x7fff, 0x0) timerfd_create(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000900)={'TPROXY\x00'}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x81, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="89d3c667b9acfeb1216eff950eb6f3f77459c4d8fbe0ef4a76314bae70df0d37f225cf5b95be21a748ad94edf98118224cda8b3da2d211037426d9f517140598b69a283b9474797633db58", 0x4b, 0x6}, {&(0x7f00000002c0)="3ea3975c60761de06933fd819568fc28242175a20a4f6965730bd115818b93e851a884d769b15099dfcc30724604ae81395631688d4b42e35f13ed44e401bc134d91c96129e052f2", 0x48, 0x7}, {&(0x7f0000000240)="4b8bbdea671dea3b9d1c04b9f3c00884d6ec9d86b70d47b6eb6c85", 0x1b, 0x9}, {&(0x7f0000000340)="e9ee27a45f72ff90ee8d0b15f4c74a41274646fbc1e1ae74f872f87679d5583fb44bf3e106fd647cad0377c91ff86809f5cb980a04d907e7a53c8b363a48b2322ac1771f598af396121dc3ebae25b4aead5fa12921eb1424062858a1e6c0cac2a8291a22e8ef24c9b6a7af50c4691f28a80f4410036b2832069632c67ce66e2d379c7bcb7c1e1e55faf64772cf4cac0461def011e56d0d644eee44b7ac4231b244a9d6257171276b5404d9a13da567a3857304c6299a14da4ef4779f380043f6fe20296181f5", 0xc6, 0x55ed}], 0x2090000, &(0x7f0000000680)={[{@resize_size={'resize', 0x3d, 0x10001}}, {@errors_continue='errors=continue'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@grpquota='grpquota'}], [{@euid_gt={'euid>', r3}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r4}}]}) 23:16:08 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000280)={0x1}, 0x8) listen(r0, 0x8) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x800) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x71, 0x4, 0x2, "971bbc86ff649237cf6c6381a24e0ada", "25cd39cabdfdea9081eca1fd1263747877717311e361724ead2d4ae9851194b79563e05fc2f6ea6cdcc238f56a8ac45848b82a249ca36452cad139fd275177c1c2017d43a9acdb0228afe0ec7e3a8c7c8fb3146adc49a926c6be5dc2"}, 0x71, 0x1) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) close(r2) [ 236.382682][ T9572] SELinux: duplicate or incompatible mount options [ 236.421838][ T9575] 9pnet: p9_errstr2errno: server reported unknown error #q 23:16:08 executing program 3: r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) setsockopt$ax25_int(r0, 0x101, 0x6, &(0x7f0000001140)=0x10000, 0xdc) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x2000, 0x0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000040)={0x5, 0xffff, [0x7, 0x1f80000, 0x1c1, 0x1800000000, 0x9], 0x4}) [ 236.480305][ T9584] 9pnet: p9_errstr2errno: server reported unknown error #q 23:16:08 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xd, 0x3, &(0x7f0000c91000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2e, 0x57}}, &(0x7f0000000000)='syzkaller\x00'}, 0x48) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x80000) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000180)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x101000, 0x0) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f0000000080)) 23:16:08 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) openat$selinux_member(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/member\x00', 0x2, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x800) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) 23:16:08 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000080)={&(0x7f0000000000)='./bus\x00', r0}, 0x10) open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) [ 236.822345][ T24] audit: type=1400 audit(1561936568.780:51): avc: denied { prog_run } for pid=9596 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 236.847147][ T9603] SELinux: duplicate or incompatible mount options 23:16:08 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$radio(&(0x7f0000000280)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_SUBDEV_S_SELECTION(r1, 0xc040563e, &(0x7f00000004c0)={0x1, 0x0, 0x100, 0x1, {0x3, 0x3, 0x1f, 0x8}}) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000003c0)={r0, r0, 0x80000000, 0xcf, &(0x7f00000002c0)="8050f7325afbb578e9aaeda3d6bb0facc8db74058e721ff9c2053b488707a7753c070e410f416ec1cab79ece5870eb0450e5da09e5c0de61ecf68ea743836c37ff3d45c35298262efd328fc26b39d22450a8ac1ff33dfeb5520ec39aee37237a0acaf88338e179fc12b6caa73df6222dec53fe31e32ce9b22ab95a18914e9da09fe3f55bc6aec30479e6ecbb8e4a456519446ec9130aa0e43d725a84dd8bdc50777cf7de42bb576ec426a0ad1549bfba9c12917c7c694a2dbe53b4d9d913fe1c3dce672725a550ef9374dcf2023e16", 0xfffffffffffffffe, 0x3, 0x80, 0x6, 0x5, 0x1, 0xfff, 'syz1\x00'}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x8080, 0x0) getsockopt$bt_BT_SECURITY(r2, 0x112, 0x4, &(0x7f0000000080), 0x2) delete_module(&(0x7f0000000480)='proc\x00', 0x200) ioctl$int_out(r0, 0x2, &(0x7f00000000c0)) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000580)=@nat={'nat\x00', 0x1b, 0x5, 0x610, 0x2c8, 0x3d8, 0x3d8, 0x160, 0x3d8, 0x540, 0x540, 0x540, 0x540, 0x540, 0x5, &(0x7f0000000500), {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x6}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x0, 0xaa, 0x0, 0x1}}]}, @unspec=@SNAT1={0x48, 'SNAT\x00', 0x1, {0x0, @ipv6=@remote, @ipv6=@empty, @icmp_id=0x68, @icmp_id=0x64}}}, {{@ipv6={@local, @loopback, [0xffffff00, 0xff000000, 0xffffffff, 0xffffff00], [0xffffff00, 0xff], 'bcsf0\x00', 'team0\x00', {}, {}, 0x73, 0x3ff, 0x3, 0x8}, 0x0, 0x140, 0x168, 0x0, {}, [@common=@dst={0x48, 'dst\x00', 0x0, {0xacf8, 0x4, 0x1, [0x100000000, 0x5, 0x502d, 0x3, 0x2, 0x100000001, 0x8, 0x100, 0x10000, 0x3, 0x1f, 0x80000001, 0xdd, 0x2, 0xffffffffffffffc1, 0x1ff], 0xa}}, @common=@srh={0x30, 'srh\x00', 0x0, {0x7d, 0x1, 0x80000000, 0xfff, 0x4, 0x1800, 0x20}}]}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x4, 0x7, 0x2f70}, {0x8, 0xffffffff80000001, 0x5}}}}, {{@ipv6={@rand_addr="aa52ca32801dee98b3dbfbc26a83cc67", @ipv4={[], [], @empty}, [0x0, 0xff, 0xff, 0xff], [0xff, 0x0, 0xffffffff, 0xffffffff], 'team_slave_0\x00', 'gre0\x00', {0xff}, {}, 0x3a, 0xffffffffffff0001, 0x5}, 0x0, 0xc8, 0x110}, @NETMAP={0x48, 'NETMAP\x00', 0x0, {0x3, @ipv4=@local, @ipv4=@loopback, @icmp_id=0x7, @gre_key=0x1f}}}, {{@uncond, 0x0, 0x120, 0x168, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x1, 0x8d}}, @common=@ah={0x30, 'ah\x00', 0x0, {0x4d4, 0x4d3, 0x80000001, 0x8, 0x2}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x8, @ipv4=@rand_addr=0xeb, @ipv4=@multicast2, @icmp_id=0x68, @gre_key=0x9}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x670) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="040100001a0005020000000000000000ff0100000000000000000000000000017f00000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb000000000000000000000000000000023c0000ff030000000000002544e0000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000003aba7833de6ada147ab874676aa92a0000000014000e00fe800000000000000005000000000000"], 0x104}}, 0x0) socket$inet6(0xa, 0x1, 0x7) [ 236.888098][ T24] audit: type=1400 audit(1561936568.820:52): avc: denied { set_context_mgr } for pid=9608 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 23:16:08 executing program 3: syz_emit_ethernet(0x7a, &(0x7f0000000100)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "975392", 0x44, 0x67, 0x0, @ipv4={[], [], @local}, @local, {[], @gre}}}}}, 0x0) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x84000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={r0, 0xc0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=0x9, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x3, 0x2}, 0x0, 0x0, &(0x7f00000000c0)={0x5, 0xe, 0x9, 0x6}, &(0x7f0000000180)=0x81, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x2}}, 0x10) connect$unix(r0, &(0x7f0000000540)=@abs={0x1, 0x0, 0x4e24}, 0x6e) socket$rxrpc(0x21, 0x2, 0x2) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x2975163b}}, 0x4b, 0x4, 0x4, 0x4, 0x10}, &(0x7f00000003c0)=0x98) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000480)=ANY=[@ANYBLOB="6d616e676c6500000009000000000000000000000000000000000000000000005a000000aab9add6647ed0a047acac08b5aca18be2748a8fbec11052dd63b5f4002ac74694fa01e9fe642a978525793dab989862d2974809a5b9855ff95b92eff15a15729cdd04fa25f98b3208db61823bea2f20b5ad242ea1d1b812243b"], &(0x7f0000000500)=0x7e) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000400)={r1, 0x80}, &(0x7f0000000440)=0x8) [ 237.130073][ T9619] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 23:16:09 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000d80)={'team_slave_1\x00'}) r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x7fff, 0x0) timerfd_create(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000900)={'TPROXY\x00'}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x81, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="89d3c667b9acfeb1216eff950eb6f3f77459c4d8fbe0ef4a76314bae70df0d37f225cf5b95be21a748ad94edf98118224cda8b3da2d211037426d9f517140598b69a283b9474797633db58", 0x4b, 0x6}, {&(0x7f00000002c0)="3ea3975c60761de06933fd819568fc28242175a20a4f6965730bd115818b93e851a884d769b15099dfcc30724604ae81395631688d4b42e35f13ed44e401bc134d91c96129e052f2", 0x48, 0x7}, {&(0x7f0000000240)="4b8bbdea671dea3b9d1c04b9f3c00884d6ec9d86b70d47b6eb6c85", 0x1b, 0x9}, {&(0x7f0000000340)="e9ee27a45f72ff90ee8d0b15f4c74a41274646fbc1e1ae74f872f87679d5583fb44bf3e106fd647cad0377c91ff86809f5cb980a04d907e7a53c8b363a48b2322ac1771f598af396121dc3ebae25b4aead5fa12921eb1424062858a1e6c0cac2a8291a22e8ef24c9b6a7af50c4691f28a80f4410036b2832069632c67ce66e2d379c7bcb7c1e1e55faf64772cf4cac0461def011e56d0d644eee44b7ac4231b244a9d6257171276b5404d9a13da567a3857304c6299a14da4ef4779f380043f6fe20296181f5", 0xc6, 0x55ed}], 0x2090000, &(0x7f0000000680)={[{@resize_size={'resize', 0x3d, 0x10001}}, {@errors_continue='errors=continue'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@grpquota='grpquota'}], [{@euid_gt={'euid>', r3}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r4}}]}) 23:16:09 executing program 2: r0 = socket$caif_seqpacket(0x25, 0x5, 0xfffffffffffffff9) connect$caif(r0, &(0x7f0000000080)=@util={0x25, "e60f3bb00ce920cc3ff633fc570b1531"}, 0xa) r1 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xff, 0x200) fadvise64(r0, 0x0, 0x9, 0x3) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0xfffffffffffffcd8, &(0x7f00000000c0)}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f00000001c0)={r2, 0x7}, &(0x7f0000000200)=0x8) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000340)={0x6, 0x0, 0x0, 0xfffffffffffffffb}) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000380)={0xe52, r3, 0x1, 0x9}) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000400)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000004040000849b316a"], &(0x7f0000000440)=0x28) r4 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000480)={r1, 0x1c68, 0x3, r1}) sendmsg$FOU_CMD_DEL(r1, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x3000}, 0xc, &(0x7f00000002c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="00042bbd7000fcdbdf2502000000080002000a00000008000800ac1414aa080002000a00000008009859767937b84622dae6f10404bdbb01004e220000"], 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x40040) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000040)) setsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f00000003c0), 0x4) 23:16:09 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x80010000000002, 0x0) r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1000000, r1) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="23000000420081aee405e9a4000000000000c6ff07d800400300"/35, 0x23}], 0x1}, 0x1) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/mixer\x00', 0x208100, 0x0) recvfrom$netrom(r2, &(0x7f0000000280)=""/134, 0x86, 0x2000, &(0x7f0000000340)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x4}, [@null, @default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000019c0)='/dev/sequencer\x00', 0x111040, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) getpeername$llc(r3, &(0x7f00000001c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x10) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x11, r2, 0x24) ioctl$KVM_SET_BOOT_CPU_ID(r2, 0xae78, &(0x7f00000003c0)=0x2) fsync(r3) write$ppp(r3, &(0x7f0000000100)="ad4f693e0fea52d7ba985df5e26c9e619ddef93f6d0263bbc25cd4d159ae31fbbd24085eea038686eacc4e8199c13760617a3feb0453c6bab274aad822dfe8b64ce9f993cd64d2bd6e02114b926d909656f7befb61a85dc164f9e18663055c24de8ce8cecc2f2e799084b0decaf83058373d047ae9eeea403216407030a79f59e07f71b226b8b1cde4af07e35f2c1335b9b060abc36d096f754f7274ff03efe840f3efa4a3185a0f49ed9bb3add0f193fec333", 0xb3) 23:16:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) socket$caif_stream(0x25, 0x1, 0x3) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:09 executing program 3: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x4, 0x400000) ioctl$RTC_PIE_OFF(r0, 0x7006) r1 = socket$inet(0x10, 0x2, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000001180)="11dca5055e0bcfec7be070") sendmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="24000000180007841dfffd946f610500020081001f03fe0604000800080004000400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) [ 237.291298][ T9632] SELinux: duplicate or incompatible mount options [ 237.308979][ T9619] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. 23:16:09 executing program 2: openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}]}}, &(0x7f0000000440)=""/214, 0x2a, 0xd6, 0x1}, 0x20) [ 237.358810][ T9642] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 23:16:09 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x80, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000080)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x5}]}}}]}, 0x3c}}, 0x0) 23:16:09 executing program 0: ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000d80)={'team_slave_1\x00'}) r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x7fff, 0x0) timerfd_create(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x1c) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000900)={'TPROXY\x00'}, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x81, 0x5}, 0x0, 0xffffffffffffffff, r0, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e85500dd0000040d000600ea1102000005000000", 0x29}], 0x1) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000004c0)={{{@in6=@dev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f00000005c0)=0xe8) fstat(r1, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f00000001c0)="89d3c667b9acfeb1216eff950eb6f3f77459c4d8fbe0ef4a76314bae70df0d37f225cf5b95be21a748ad94edf98118224cda8b3da2d211037426d9f517140598b69a283b9474797633db58", 0x4b, 0x6}, {&(0x7f00000002c0)="3ea3975c60761de06933fd819568fc28242175a20a4f6965730bd115818b93e851a884d769b15099dfcc30724604ae81395631688d4b42e35f13ed44e401bc134d91c96129e052f2", 0x48, 0x7}, {&(0x7f0000000240)="4b8bbdea671dea3b9d1c04b9f3c00884d6ec9d86b70d47b6eb6c85", 0x1b, 0x9}, {&(0x7f0000000340)="e9ee27a45f72ff90ee8d0b15f4c74a41274646fbc1e1ae74f872f87679d5583fb44bf3e106fd647cad0377c91ff86809f5cb980a04d907e7a53c8b363a48b2322ac1771f598af396121dc3ebae25b4aead5fa12921eb1424062858a1e6c0cac2a8291a22e8ef24c9b6a7af50c4691f28a80f4410036b2832069632c67ce66e2d379c7bcb7c1e1e55faf64772cf4cac0461def011e56d0d644eee44b7ac4231b244a9d6257171276b5404d9a13da567a3857304c6299a14da4ef4779f380043f6fe20296181f5", 0xc6, 0x55ed}], 0x2090000, &(0x7f0000000680)={[{@resize_size={'resize', 0x3d, 0x10001}}, {@errors_continue='errors=continue'}, {@iocharset={'iocharset', 0x3d, 'cp852'}}, {@grpquota='grpquota'}], [{@euid_gt={'euid>', r3}}, {@seclabel='seclabel'}, {@fowner_gt={'fowner>', r4}}]}) 23:16:09 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$rds(r2, &(0x7f0000002180)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000640)=""/106, 0x6a}, {&(0x7f00000006c0)=""/188, 0xbc}, {&(0x7f00000005c0)=""/11, 0xb}, {&(0x7f0000000780)=""/61, 0x3d}, {&(0x7f00000007c0)=""/61, 0x3d}, {&(0x7f0000000800)=""/243, 0xf3}], 0x6, &(0x7f0000002080)=[@rdma_args={0x48, 0x114, 0x1, {{0xdc9, 0x3}, {&(0x7f0000000980)=""/4096, 0x1000}, &(0x7f0000001c80)=[{&(0x7f0000001980)=""/50, 0x32}, {&(0x7f00000019c0)=""/221, 0xdd}, {&(0x7f0000001ac0)=""/65, 0x41}, {&(0x7f0000001b40)=""/210, 0xd2}, {&(0x7f0000001c40)=""/60, 0x3c}], 0x5, 0x0, 0x100000000}}, @cswp={0x58, 0x114, 0x7, {{0xeed, 0x3b}, &(0x7f0000001d00)=0x4, &(0x7f0000001d40)=0xffff, 0x2, 0x7a53, 0x40, 0x1d3a, 0x11, 0x4}}, @rdma_args={0x48, 0x114, 0x1, {{0x6, 0xb466}, {&(0x7f0000001d80)=""/95, 0x5f}, &(0x7f0000002040)=[{&(0x7f0000001e00)=""/249, 0xf9}, {&(0x7f0000001f00)=""/207, 0xcf}, {&(0x7f0000002000)=""/17, 0x11}], 0x3, 0x10, 0x5}}, @rdma_dest={0x18, 0x114, 0x2, {0x5, 0x9d}}], 0x100, 0x880}, 0x40000) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r1, 0xc028ae92, &(0x7f0000000600)={0xffffffffffffffc1, 0x3}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_S390_UCAS_UNMAP(r2, 0x4018ae51, &(0x7f0000002240)={0x8000, 0x5, 0x8}) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000140)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000001c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000380), r5, 0x3}}, 0x18) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x60, 0x0, 0xfffffffffffffffd], 0x1f004}) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) poll(&(0x7f0000000580)=[{r0, 0x488}], 0x1, 0x2) ioctl$KVM_SET_MSRS(r2, 0x4008ae89, &(0x7f00000021c0)={0x4, 0x0, [{0x2d5, 0x0, 0x9}, {0xafc}, {0xbfb, 0x0, 0x2}, {0xbf7, 0x0, 0x3}]}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:16:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) write$P9_RLERRORu(r0, &(0x7f0000000780)={0xe, 0x7, 0x1, {{0x1, ':'}, 0x6}}, 0xe) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:09 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x2c, @dev={0xac, 0x14, 0x14, 0x29}, 0x4e20, 0x4, 'wrr\x00', 0x20, 0x1, 0x5e}, 0x2c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000300)={{0xd000, 0x3000, 0xb, 0x8, 0x0, 0x1d1, 0x1, 0x5, 0x2, 0x3ff, 0x800, 0xc1b2}, {0x4000, 0x5000, 0xf, 0x0, 0x7, 0x1000, 0x9, 0xca, 0x1, 0x4, 0x2c5, 0x1ff}, {0x2000, 0x0, 0xb, 0x9, 0x3, 0x4, 0x6, 0x5, 0x40, 0x844, 0x1, 0x2}, {0x0, 0x6000, 0xb, 0x12, 0x3, 0x6, 0x5, 0x6, 0x1, 0x9, 0x1, 0xcf}, {0xf000, 0x1000, 0xf, 0x59, 0x6, 0xa93c, 0x0, 0x2, 0x8001, 0xfffffffffffffffd, 0xffff, 0xfffffffffffffffb}, {0x10004, 0x2, 0xa, 0x3ff, 0x343e, 0x3, 0x2, 0x1000, 0xe564, 0x0, 0x4, 0x6}, {0xf004, 0x0, 0xf, 0x8849, 0x8001, 0x2, 0x7f, 0xfffffffffffffff7, 0x100000001, 0x9e62, 0x7ff, 0x7fffffff}, {0xf004, 0x2000, 0xf, 0x3, 0x1f, 0xffffffffffffcdb9, 0x8000, 0x3, 0x1, 0x9, 0x3, 0x3}, {0xf000, 0xf000}, {0xd004, 0x106004}, 0x40000, 0x0, 0x0, 0x100, 0xe, 0x1d00, 0x7000, [0x7, 0x1, 0x384]}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000440)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000ebfd1da913f4513ba539050000000061120000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) [ 237.683064][ T9654] SELinux: duplicate or incompatible mount options 23:16:09 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) sendto$isdn(r0, &(0x7f0000000700)={0x6, 0xfffffffffffffff8, "d177cf9d3a2dea1a28c2f2f33d6260dd6870b9b23b"}, 0x1d, 0x0, &(0x7f0000000740)={0x22, 0x1, 0x401, 0xbc, 0x1}, 0x6) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:10 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x100, 0x0) getsockopt$rose(r1, 0x104, 0x7, &(0x7f0000000240), &(0x7f0000000280)=0x4) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) ioctl$VIDIOC_TRY_DECODER_CMD(r2, 0xc0485661, &(0x7f0000000180)={0x4, 0x1, @stop_pts=0x1}) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x17e, 0x4) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='security.apparmor\x00') listen(r0, 0x100000000008) listen(r0, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040), 0x4) listen(r0, 0x8001) [ 238.044083][ T9667] SELinux: duplicate or incompatible mount options [ 238.118164][ T9651] (unnamed net_device) (uninitialized): Unable to set down delay as MII monitoring is disabled 23:16:10 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) ioctl$CAPI_NCCI_OPENCOUNT(r0, 0x80044326, &(0x7f00000006c0)=0xb739) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x282, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xf4, r2, 0x301, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd0}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x12fc}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffff6ec}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x864b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xecd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x61f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x500000000000000}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x26b26b168}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = socket$inet(0x2, 0x3, 0x6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r4, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x48, 0x15, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@typed={0x34, 0x0, @binary="582f45cfac1414aa1b0965512fe4fa59a835ee66ac1414aafd3953ffee03d79dc442c6bbe736863d55a7374efe"}]}, 0x48}}, 0x0) [ 238.414247][ T9683] SELinux: duplicate or incompatible mount options 23:16:10 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4050000000100006110a4000000000003000000000000009500000000000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x0, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f00000000c0)={0x10001, 0x54}) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) 23:16:10 executing program 5: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x401) listen(r0, 0x80000000) 23:16:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20ncci\x00', 0x282, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000300)={&(0x7f0000000140), 0xc, &(0x7f00000002c0)={&(0x7f00000001c0)={0xf4, r2, 0x301, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd0}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID={0xc}]}, @TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x81}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x12fc}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffff6ec}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x864b}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xecd}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7a}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x61f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x500000000000000}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x80000001}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x26b26b168}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4}, 0x40000) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r3 = socket$inet(0x2, 0x3, 0x6) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) sendmsg$nl_generic(r4, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x48, 0x15, 0x7, 0x0, 0x0, {0x2, 0xf0ffff, 0x600}, [@typed={0x34, 0x0, @binary="582f45cfac1414aa1b0965512fe4fa59a835ee66ac1414aafd3953ffee03d79dc442c6bbe736863d55a7374efe"}]}, 0x48}}, 0x0) 23:16:10 executing program 2: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DEL(r0, 0x0, 0x484, &(0x7f0000000080)={0x2c, @dev={0xac, 0x14, 0x14, 0x29}, 0x4e20, 0x4, 'wrr\x00', 0x20, 0x1, 0x5e}, 0x2c) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_SREGS(r0, 0x4138ae84, &(0x7f0000000300)={{0xd000, 0x3000, 0xb, 0x8, 0x0, 0x1d1, 0x1, 0x5, 0x2, 0x3ff, 0x800, 0xc1b2}, {0x4000, 0x5000, 0xf, 0x0, 0x7, 0x1000, 0x9, 0xca, 0x1, 0x4, 0x2c5, 0x1ff}, {0x2000, 0x0, 0xb, 0x9, 0x3, 0x4, 0x6, 0x5, 0x40, 0x844, 0x1, 0x2}, {0x0, 0x6000, 0xb, 0x12, 0x3, 0x6, 0x5, 0x6, 0x1, 0x9, 0x1, 0xcf}, {0xf000, 0x1000, 0xf, 0x59, 0x6, 0xa93c, 0x0, 0x2, 0x8001, 0xfffffffffffffffd, 0xffff, 0xfffffffffffffffb}, {0x10004, 0x2, 0xa, 0x3ff, 0x343e, 0x3, 0x2, 0x1000, 0xe564, 0x0, 0x4, 0x6}, {0xf004, 0x0, 0xf, 0x8849, 0x8001, 0x2, 0x7f, 0xfffffffffffffff7, 0x100000001, 0x9e62, 0x7ff, 0x7fffffff}, {0xf004, 0x2000, 0xf, 0x3, 0x1f, 0xffffffffffffcdb9, 0x8000, 0x3, 0x1, 0x9, 0x3, 0x3}, {0xf000, 0xf000}, {0xd004, 0x106004}, 0x40000, 0x0, 0x0, 0x100, 0xe, 0x1d00, 0x7000, [0x7, 0x1, 0x384]}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000440)) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup.net/syz0\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x12, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000ebfd1da913f4513ba539050000000061120000000000009500000000000000"], &(0x7f0000000140)='GPL\x00', 0x1, 0xfb, &(0x7f0000000200)=""/251, 0x0, 0x0, [], 0x0, 0xf}, 0x48) sendmsg(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000780)={r1, r2, 0xf, 0x1}, 0x10) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='memory.events\x00', 0x2da8020000100000, 0x500001c) [ 240.313142][ T9708] IPVS: ftp: loaded support on port[0] = 21 [ 240.493032][ T9708] chnl_net:caif_netlink_parms(): no params data found [ 240.521298][ T9708] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.528679][ T9708] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.536950][ T9708] device bridge_slave_0 entered promiscuous mode [ 240.604316][ T9708] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.611981][ T9708] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.620355][ T9708] device bridge_slave_1 entered promiscuous mode [ 240.697125][ T9708] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.707409][ T9708] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.728227][ T7] device bridge_slave_1 left promiscuous mode [ 240.736128][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.798020][ T7] device bridge_slave_0 left promiscuous mode [ 240.804355][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.405674][ T7] device hsr_slave_1 left promiscuous mode [ 242.475846][ T7] device hsr_slave_0 left promiscuous mode [ 242.549856][ T7] team0 (unregistering): Port device team_slave_1 removed [ 242.563104][ T7] team0 (unregistering): Port device team_slave_0 removed [ 242.575098][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 242.636547][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 242.729873][ T7] bond0 (unregistering): Released all slaves [ 242.847965][ T9708] team0: Port device team_slave_0 added [ 242.856807][ T9708] team0: Port device team_slave_1 added [ 242.905403][ T9708] device hsr_slave_0 entered promiscuous mode [ 242.964091][ T9708] device hsr_slave_1 entered promiscuous mode [ 243.050542][ T9708] 8021q: adding VLAN 0 to HW filter on device bond0 [ 243.070613][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 243.081615][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 243.100920][ T9708] 8021q: adding VLAN 0 to HW filter on device team0 [ 243.170756][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.180113][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.200179][ T9141] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.209770][ T9141] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.230992][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.249500][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.263956][ T9141] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.272777][ T9141] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.288012][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 243.311480][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.319779][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 243.336094][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.349271][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.375741][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 243.390619][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.407011][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.420341][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 243.444001][ T9708] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 243.468533][ T9708] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 243.481295][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 243.524888][ T9708] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 243.712169][ T9716] netlink: 'syz-executor.0': attribute type 6 has an invalid length. 23:16:15 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000000)='/dev/video#\x00', 0x5, 0x0) ioctl$VIDIOC_S_CROP(r0, 0x4014563c, &(0x7f0000000040)) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000000c0)) 23:16:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f0000000600)) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:15 executing program 5: r0 = openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video37\x00', 0x2, 0x0) ioctl$VIDIOC_ENUM_FMT(r0, 0xc058560f, &(0x7f0000000040)={0x0, 0x9, 0x0, "fd25f512245c2ac75ca303868634d178973d28010e1295a5d4c47026a1253952"}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8880, 0x0) ioctl$DRM_IOCTL_RES_CTX(r1, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{}]}) 23:16:15 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000280)={&(0x7f0000000000)={0xa, 0x4e24, 0x0, @mcast1, 0x6}, 0x1c, 0x0}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1, 0x200) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000080)={0x0, 0x2}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000000100)={r2, 0x4, 0xbf, "db71d87aa42fab5c8ff6a5149916fbf74ee5364a10bbb5c352894d5690e027ee665a73e0b89dba96562c802e52a8e3d4f4ea3b2f691f6b0943a95797a89c0ab2fe1de4a063605a1bb41795f26fbfebd0776450860de7242bab02680aafbd0d368ad2a4671c9aebb1957dd9c5a55cee2d6914696e5e38e0084b0651fb48810de5df5c48590c4f09b9744e2bf6f17db238047cf7b579cbd32eb20643849cdcb085a9daf1f62975cf83a1ae5c0e07c1ed1ac35412a498a997f7641a6d5abebd1e"}, 0xc7) 23:16:15 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="674466981c00000004000000010000005177df2eb2780b60"], 0x18) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x3, 'syz_tun\x00', 0x1}, 0x18) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x208000, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000140)={0x7, 0x6d, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000400)=0xac3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x200000000000000, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0, 0x1000000000054}, 0x98) ioctl$EVIOCGUNIQ(r2, 0x80404508, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r4, r0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x400) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "3206a3286468c22c", "5d5083c05eea284eca669d62bac8c3c4dcf713dc8430dcec046501fd7b8737ad"}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r6, 0x40605346, &(0x7f00000001c0)={0x0, 0x0, 0x2, 'queue0\x00\xff\x00'}) 23:16:15 executing program 2: r0 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000040)) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000100)={0x0, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000180)={r1, 0x6}, &(0x7f00000001c0)=0x8) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_ax25_SIOCDELRT(r2, 0x890c, &(0x7f0000000200)={@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, 0x3, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null]}) ioctl$SIOCGIFMTU(r2, 0x8921, &(0x7f0000000280)) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r2, 0x40085112, &(0x7f0000000080)={{0xffffff94}, {0xfdfdffff}, 0x0, 0x0, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000]}) 23:16:15 executing program 5: r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0xffffffffffffffe1, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f00000000c0)={'rose0\x00', {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x28}}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000200)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}}) [ 243.888474][ T9723] SELinux: duplicate or incompatible mount options 23:16:15 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f00000005c0)={0xd000, 0xa000}) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:15 executing program 2: open(&(0x7f00000003c0)='./file0\x00', 0x141042, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="66645a55e03b53", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040004,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 23:16:15 executing program 1: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x4000, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r0, 0x891b, &(0x7f0000000380)={'nr0\x00', {0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="9feb01001800000000000000b3000000befeffffc5ffffff0c0000000000000e03000000000000000100000000000008000000000b00000006000009000000000b00000005000000000080020300000001000000080000000c00000002000000ffffff7f0400000003000000040000000300000001000000008000000400000002000000ff030000000000000000000a040300000000000000000009050000000200000000000008050000000a00000004000085040000000000000002000000010000000100000002000000010000000500000002000000000000000900000001000000010100000000"], &(0x7f0000000500)=""/211, 0xea, 0xd3}, 0x20) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x8, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f0000000040)=0x8000, 0x4) ioctl$VIDIOC_ENUMAUDIO(r2, 0xc0345641, &(0x7f0000000300)={0x0, "fc6d5b4924fa690499f51dec6b51a6de543e2deb668191b63cafc8fc7d14cb93", 0x2, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000caefb8)={0x17, 0x1, &(0x7f0000000080)=@raw=[@exit], &(0x7f0000000000)='G\xffL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') getdents(r2, &(0x7f00000002c0)=""/35, 0x23) sendmsg$TIPC_CMD_SET_LINK_TOL(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10002}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x68, r3, 0x300, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x3, @media='eth\x00'}}}, [""]}, 0x68}, 0x1, 0x0, 0x0, 0x8000}, 0x24004010) write$UHID_DESTROY(r0, &(0x7f0000000280), 0x4) 23:16:16 executing program 5: socket$kcm(0x2b, 0x1, 0x0) r0 = socket(0x7, 0x5, 0x0) accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14, 0x80000) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000140)={@multicast1, @multicast2, r1}, 0xc) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8200, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x200000, 0x0) ioctl$UDMABUF_CREATE(r2, 0x40187542, &(0x7f0000000080)={r3, 0x0, 0xfffff000, 0xfffffffffffff000}) socket$kcm(0xa, 0x4, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.swap.current\x00', 0x26e1, 0x0) r5 = socket$kcm(0x2, 0x1000000000000002, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x3e, &(0x7f00000002c0)=r4, 0x100) ioctl$VIDIOC_RESERVED(r4, 0x5601, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r4, 0x8818564c, &(0x7f0000000400)) sendmsg$kcm(r5, &(0x7f0000003d00)={&(0x7f0000000380)=@un=@file={0x0, './file0\x00'}, 0x80, 0x0}, 0xfd00) write$cgroup_subtree(r5, 0x0, 0x2) [ 244.220301][ T9751] SELinux: duplicate or incompatible mount options 23:16:16 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x0, 0x0) write$nbd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="674466981c00000004000000010000005177df2eb2780b60"], 0x18) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000040)={0x3, 'syz_tun\x00', 0x1}, 0x18) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$IOC_PR_CLEAR(0xffffffffffffffff, 0x401070cd, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x208000, 0x0) write$P9_RFLUSH(r0, &(0x7f0000000140)={0x7, 0x6d, 0x2}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r3, 0x8) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) r5 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r4, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$VIDIOC_S_OUTPUT(r2, 0xc004562f, &(0x7f0000000400)=0xac3) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r5, 0x84, 0x6e, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f0000000340)={0x0, @in={{0x2, 0x200000000000000, @empty}}, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc, 0x0, 0x1000000000054}, 0x98) ioctl$EVIOCGUNIQ(r2, 0x80404508, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f0000000080)={r4, r0}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu\x00', 0x200002, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x400) r6 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 'client0\x00', 0x0, "3206a3286468c22c", "5d5083c05eea284eca669d62bac8c3c4dcf713dc8430dcec046501fd7b8737ad"}) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r6, 0x40605346, &(0x7f00000001c0)={0x0, 0x0, 0x2, 'queue0\x00\xff\x00'}) 23:16:16 executing program 0: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r1, 0xb28, 0x70bd26, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x14) socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0xa00000000000000, 0x80, &(0x7f00000000c0)=@broute={'broute\x00', 0x20, 0x1, 0x948, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20000480], 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff010000000b00000000000000000062726964676530000000000000000000626f6e645f736c6176655f3000000000736974300000000000000000000000007465716c3000000000000000000000000000000000000000000000000180c20000000000000000000000b8080000b8080000e8080000616d6f6e670000000000000000000000000000000000000000000400000000001804000000000000000000000c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d6599200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000053cbf7eee533b170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fffffffffffffff8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000072656469726563740000000000000000000000000000000000000000000000000800"/2368]}, 0x9b8) 23:16:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x2, 0x2) setsockopt$inet_dccp_int(r0, 0x21, 0x3, &(0x7f0000000040)=0x80000000, 0x4) 23:16:16 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r1, 0x404c534a, &(0x7f0000000540)={0x6, 0x4, 0x4}) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:16 executing program 5: chroot(&(0x7f0000000080)='./file0\x00') r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="3200000004000000000000000000000094000000000000000a0000000000000000000000ff00000000008e9bf9dfed69cf57400889fa5e628a62fed0177fbd6614ad1af03c3c991cea4ecfab69c4fd92072ea2339361ad87afe7b6444af7a4d7d324eb"], 0x32) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x80044d00, &(0x7f00000001c0)) 23:16:16 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) syz_init_net_socket$ax25(0x3, 0x3, 0x0) io_uring_setup(0xd64, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x33}) 23:16:16 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r0, &(0x7f0000000100), 0x10) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002140)='/dev/vcs\x00', 0x0, 0x0) setsockopt(r0, 0x65, 0x10000000002, &(0x7f0000000000)="e1affde3", 0x4) write$P9_RLERRORu(r1, &(0x7f0000000040)={0x16, 0x7, 0x1, {{0x9, '/dev/vcs\x00'}, 0x7}}, 0x16) dup2(r1, r0) [ 244.886772][ T9781] SELinux: duplicate or incompatible mount options 23:16:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000140)=0xffffffffffffffff) ioctl(r1, 0x7ff, &(0x7f00000001c0)="c0dc176c2f7da127ac20e1") set_thread_area(&(0x7f0000000040)={0x0, 0x20001000, 0x6400, 0x4, 0x8, 0x3f, 0x7fff, 0x2f, 0x200, 0x7}) r2 = socket$inet6(0xa, 0x1, 0x0) flistxattr(r2, &(0x7f00000000c0)=""/76, 0x4c) setsockopt$inet6_int(r2, 0x29, 0x31, &(0x7f0000000180)=0x9, 0x4) getsockopt$inet6_buf(r2, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000080)=0xffffffee) [ 244.935517][ T24] audit: type=1400 audit(1561936576.890:53): avc: denied { map } for pid=9788 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16099 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:16:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) getpeername$ax25(r0, &(0x7f0000000480)={{0x3, @null}, [@remote, @bcast, @rose, @rose, @default, @remote, @netrom, @rose]}, &(0x7f0000000500)=0x48) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:17 executing program 3: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ftruncate(r0, 0x0) r1 = open(&(0x7f00000004c0)='./bus\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f00000000c0)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000240)=ANY=[@ANYBLOB="000000000000fffffffca000000000000000000000000000005f000000000759f7a62abbc651aef0d3615b4ea286c231b62005ab7800000000000067c0433599b6a4165b1d621a2a491a7dc2a3414144341d60e523f5b409cfeaa58fb5e5069b9fa085c0864acc592cb602911ebe8948e3eebf50e7300338df808bfd7d61ebddc1167959e515a20f6e8b81fc1d55f9427684d227ffd48c4d1e5a9388b84e7655952def93082d260a30647569fd879cffc09c740a7f963cf973e86b84edeeebc9e042a3c10227ea9b30929439a895227a52a7b3a35e1e8c7ebc9e452513e1dc5912b0bc236f6a3381df80135d7e"]) 23:16:17 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0xf, 0x0) ioctl$VIDIOC_ENUMINPUT(r0, 0xc050561a, &(0x7f0000000080)={0x3, "19868e8d78b523e15c198364b42f9860549f99fbe02a87068329870cb6a3880b"}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000300)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000340)=0x5) r2 = syz_open_dev$mice(&(0x7f00000002c0)='/dev/input/mice\x00', 0x0, 0x200) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000200)={@rand_addr, @multicast2, 0x0}, &(0x7f0000000240)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000280)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x42, r3}) ioctl$VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000100)={0x5, @vbi={0x3ff, 0x4, 0x3, 0x50313459, [0x9, 0x7ff], [0xf85e, 0x7], 0x13b}}) 23:16:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x80000, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r1, 0x81785501, &(0x7f0000000100)=""/138) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000440)) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/4\x00') preadv(r3, &(0x7f0000000700)=[{&(0x7f0000000600)=""/246, 0x2b7}], 0x1, 0x0) [ 245.120576][ T24] audit: type=1400 audit(1561936576.920:54): avc: denied { map } for pid=9788 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16099 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 23:16:17 executing program 1: sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="bf00"/18], 0x1}}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0xfffffffffffffd33) connect(r0, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @dev, 0x6}, 0x80) sendmmsg$inet_sctp(r0, &(0x7f00000003c0), 0x3a301e0909ff38c, 0x0) [ 245.266830][ T9806] SELinux: duplicate or incompatible mount options [ 245.282006][ T24] audit: type=1804 audit(1561936577.180:55): pid=9805 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir880670521/syzkaller.RMnL0K/24/bus" dev="sda1" ino=16595 res=1 23:16:17 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) set_mempolicy(0x4002, &(0x7f0000000240)=0x1, 0x12) write$P9_RLOCK(r0, &(0x7f0000000080)={0x8}, 0x8) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64IPIN\x00', &(0x7f00000000c0)='\\trustedppp0%-*\\,ppp1\x00', 0x16, 0x1) 23:16:17 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) listen(r0, 0x4703) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:17 executing program 5: mkdir(&(0x7f0000000080)='./file1\x00', 0x1) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='devpts\x00', 0x0, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000380)={r1, 0x6, &(0x7f0000000180)=[0x8a8, 0x8, 0x0, 0x1a375b0a, 0x1, 0xffffffffffffff01], &(0x7f00000001c0)=[0x200, 0x6, 0x5, 0xff], 0x4, 0x3, 0xffff, &(0x7f00000002c0)=[0x9, 0x100000000, 0xfffffffffffffff7], &(0x7f0000000340)=[0x1]}) mount$overlay(0x400000, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='overlay\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="2c6c6f7765726469723d2e3afab865c637"]) r2 = openat(r0, &(0x7f00000003c0)='./file0\x00', 0x7ffc, 0x0) getdents64(r2, &(0x7f0000000240)=""/65, 0x18) [ 245.462439][ T24] audit: type=1804 audit(1561936577.220:56): pid=9811 uid=0 auid=4294967295 ses=4294967295 subj=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir880670521/syzkaller.RMnL0K/24/bus" dev="sda1" ino=16595 res=1 23:16:17 executing program 1: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x420000015005}) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r0, 0x7706, &(0x7f0000000040)) write$tun(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x1dc) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000080)=@req3={0x9, 0x7, 0x3, 0x7fff, 0x6, 0x80000001, 0x3}, 0x1c) [ 245.684645][ T9826] SELinux: duplicate or incompatible mount options 23:16:17 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@restrict={0x0, 0x0, 0x0, 0x2000058d}]}}, &(0x7f0000000500)=""/220, 0x26, 0xdc, 0x1}, 0x20) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x10002, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) 23:16:18 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x24000, 0xa000) write$P9_RRENAME(r1, &(0x7f0000000040)={0x7, 0x15, 0x2}, 0x7) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000480)=[@text32={0x20, &(0x7f00000001c0)="f30fc7b1010000000f22e30f353b30c4e1f8ae5f0a0f01cac4c27d21d666b856000f00d03e260fedc1f0ff4c86b4", 0x2e}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:16:18 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write(r0, &(0x7f00000000c0)="674aec2c", 0x4) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r2 = getpgid(0x0) tgkill(r1, r2, 0x40) 23:16:18 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000440)=@hopopts={0x8f, 0x5, [], [@ra={0x5, 0x2, 0x4}, @jumbo={0xc2, 0x4, 0x100}, @ra={0x5, 0x2, 0xb4dceb7}, @hao={0xc9, 0x10, @ipv4={[], [], @empty}}, @ra={0x5, 0x2, 0x1}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x5}]}, 0x38) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:18 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="020085ffffff01000000ff060000000000000f26000000000000cbfed81b00000000420000000000000000000000000000000000000000000000f595000055aa", 0x40, 0x1c0}]) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x20000, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x7569, &(0x7f00000000c0)=0xfffffffffffffc6c) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) [ 246.220695][ T9852] SELinux: duplicate or incompatible mount options [ 246.425411][ T9850] ldm_validate_privheads(): Disk read failed. [ 246.434606][ T9850] loop3: p1 < > p2 < p5 > p4 [ 246.472533][ T9850] loop3: partition table partially beyond EOD, truncated [ 246.507534][ T9850] loop3: p1 start 1 is beyond EOD, truncated [ 246.525525][ T9850] loop3: p2 size 2 extends beyond EOD, truncated [ 246.551236][ T9850] loop3: p4 size 38389 extends beyond EOD, truncated [ 246.578847][ T9850] loop3: p5 size 38389 extends beyond EOD, truncated [ 246.790569][ T9868] print_req_error: I/O error, dev loop3, sector 0 flags 80700 [ 246.790589][ T9867] print_req_error: I/O error, dev loop3, sector 0 flags 80700 [ 246.790790][ T2492] print_req_error: I/O error, dev loop3, sector 0 flags 0 [ 246.798877][ T9850] __loop_clr_fd: partition scan of loop3 failed (rc=-16) [ 246.806203][ T2492] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 246.828525][ T2492] print_req_error: I/O error, dev loop3, sector 0 flags 0 [ 246.835805][ T2492] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 246.836935][ T2492] print_req_error: I/O error, dev loop3, sector 0 flags 0 [ 246.851152][ T2492] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 246.859448][ T2492] print_req_error: I/O error, dev loop3, sector 0 flags 0 [ 246.859465][ T2492] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 246.861245][ T2492] print_req_error: I/O error, dev loop3, sector 0 flags 0 [ 246.881343][ T9869] print_req_error: I/O error, dev loop3, sector 0 flags 0 [ 246.883070][ T2492] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 246.889500][ T9869] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 246.897662][ T2492] print_req_error: I/O error, dev loop3, sector 0 flags 80700 [ 246.913395][ T2492] print_req_error: I/O error, dev loop3, sector 0 flags 0 [ 246.920527][ T2492] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 246.923123][ T2492] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 246.936783][ T2492] Buffer I/O error on dev loop3p4, logical block 0, async page read [ 246.944924][ T2492] Buffer I/O error on dev loop3p5, logical block 0, async page read [ 247.188573][ T24] audit: type=1400 audit(1561936579.150:57): avc: denied { map } for pid=9874 comm="syz-executor.0" path="/root/syz-executor.0" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 247.220481][ T24] audit: type=1400 audit(1561936579.180:58): avc: denied { map } for pid=9874 comm="syz-executor.0" path="/sys/kernel/debug/kcov" dev="debugfs" ino=16181 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 247.278469][ T9875] IPVS: ftp: loaded support on port[0] = 21 [ 247.463844][ T9875] chnl_net:caif_netlink_parms(): no params data found [ 247.546176][ T9875] bridge0: port 1(bridge_slave_0) entered blocking state [ 247.553397][ T9875] bridge0: port 1(bridge_slave_0) entered disabled state [ 247.563409][ T9875] device bridge_slave_0 entered promiscuous mode [ 247.571090][ T9875] bridge0: port 2(bridge_slave_1) entered blocking state [ 247.578705][ T9875] bridge0: port 2(bridge_slave_1) entered disabled state [ 247.586687][ T9875] device bridge_slave_1 entered promiscuous mode [ 247.663086][ T9875] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 247.673308][ T9875] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 247.750440][ T9875] team0: Port device team_slave_0 added [ 247.757231][ T9875] team0: Port device team_slave_1 added [ 247.824195][ T9875] device hsr_slave_0 entered promiscuous mode [ 247.905773][ T9875] device hsr_slave_1 entered promiscuous mode [ 248.026857][ T9875] bridge0: port 2(bridge_slave_1) entered blocking state [ 248.033956][ T9875] bridge0: port 2(bridge_slave_1) entered forwarding state [ 248.041236][ T9875] bridge0: port 1(bridge_slave_0) entered blocking state [ 248.048367][ T9875] bridge0: port 1(bridge_slave_0) entered forwarding state [ 248.063881][ T7] device bridge_slave_1 left promiscuous mode [ 248.070123][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 248.103151][ T7] device bridge_slave_0 left promiscuous mode [ 248.109345][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 249.715461][ T7] device hsr_slave_1 left promiscuous mode [ 249.765865][ T7] device hsr_slave_0 left promiscuous mode [ 249.828113][ T7] team0 (unregistering): Port device team_slave_1 removed [ 249.839884][ T7] team0 (unregistering): Port device team_slave_0 removed [ 249.851347][ T7] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 249.889924][ T7] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 249.979440][ T7] bond0 (unregistering): Released all slaves [ 250.103531][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.111215][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 250.146238][ T9875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.157710][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.166933][ T3487] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.178637][ T9875] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.194511][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 250.203512][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 250.211796][ T2812] bridge0: port 1(bridge_slave_0) entered blocking state [ 250.218901][ T2812] bridge0: port 1(bridge_slave_0) entered forwarding state [ 250.226848][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 250.237136][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 250.245818][ T2812] bridge0: port 2(bridge_slave_1) entered blocking state [ 250.252930][ T2812] bridge0: port 2(bridge_slave_1) entered forwarding state [ 250.272066][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 250.280916][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 250.290356][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 250.299293][ T2812] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 250.316505][ T9875] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 250.327156][ T9875] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 250.341147][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 250.349499][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 250.358301][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 250.366950][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 250.375666][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 250.385835][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 250.394330][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 250.403341][ T9141] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 250.471578][ T9875] 8021q: adding VLAN 0 to HW filter on device batadv0 23:16:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000280)={0x8f, 0x0, [0x4]}) 23:16:22 executing program 5: ioctl$VIDIOC_QUERYCAP(0xffffffffffffffff, 0x80685600, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x4002, &(0x7f0000000a80)=0xffffffffffffffff, 0xa) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') ioctl$LOOP_SET_DIRECT_IO(0xffffffffffffffff, 0x4c08, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) readv(r0, &(0x7f0000000040), 0x0) r1 = getpid() ptrace$poke(0x4, r1, &(0x7f0000000040), 0x280c45a0) syz_open_dev$adsp(0x0, 0x0, 0x0) 23:16:22 executing program 1: r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000400)={0x5, "593a4f75eefb1c350995a1e859c757d20ef2fb7beb24f9a63e0ba62727ec1d9b"}) fchmod(r0, 0x100) 23:16:22 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f00000003c0), &(0x7f0000000400)=0x8) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:22 executing program 2: bpf$MAP_CREATE(0x12, &(0x7f0000003000)={0x0, 0x0, 0x0, 0x0, 0x10020000000, 0x0}, 0x2c) r0 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x6eabc10d, 0x400) sendmsg$inet(r0, &(0x7f00000007c0)={&(0x7f0000000040)={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000080)="93767ec87766e9c5395b00075dd3d75c87cacf39eb56568a54490c5b8ca74edbf1df0df286498a6ec0b07a3a415d9c9a58c44aa3a1b759eb1ab3f6dae9df7e8d17f91190190e62540f62f5413fdd03e55aeb094becf87310019ff49e7fca8c8a0587262b8939d68a165cc45aafef5ddeadc71b5ea1caa32202f79137d484d46c1ae99bbe060a4897b6ace761889838a13b7b37834acae69a90977839f47b7b3277a8cb8a7ea2d11c880dfcbddab86ad53ae8722d8d272e48f30cd008748479ed3c0427b178c71073c40d0aca0fbd20fa914432cb9438411c40fe795dd3", 0xdd}, {&(0x7f0000000180)="298654f33895bd3697708741e86f75cd52969fa163288f72f6ce6594f7cf51a51163626f7b62cef9caa4cedefae3e62f212f26256df79ef60c01e1ace04f44c317d72f2fa10cee03e02f5577e878a46b8404d45e2e2c829064d3b6c47a157a45", 0x60}, {&(0x7f0000000200)="c39a30765902837b97211bb56d2af0980d723b7a6a1d9093f5d50fa4a3ea15cdf5528f70e491b8f3058681cdc0d67f264f1eac1493b0a8877016a7fc95e9077ff384bb16bc1627721eca2cbdf915102b740aeb7a08e1c244402fb34bdbd0a2e44727262c6cf50c06b9800a09b177b527bd2172e052e4ba8750646e6d58f27e43c80e6941fcab7f63e7d2c5c111bf1e7fcf1debc7a6fc832ed49e086b21263519f488d2944e110b495cf8918d74ae65ac075023e0d83ad4cdf63e4694b4a4eadcd992af191c57cd619eb17ccd78c092a6e6aeb3e2e7e9494d6e089dcdc4cc8f955b9b668b0c7e22b3c55cebf0cdea6c194ee07556", 0xf4}, {&(0x7f0000000300)="a80a35a8c44c573e844abc3be657aa536e01f44633fc6a6c10356e9f3bfa067810c7d45af849e4a8b910735b01b4c51e97f0c8ad6b2c6eba4eb94ca919c42d9e147fadd55cbea0e372ad98a91bd4432be3c8cdb341545933ab21aadea6316f0d015cfd49b9d5f226a145836c40896bd604841d3399a6c6d9edd03f9b362d0ce9aa86840c940e389ee1b0f7f7fdf6afa914373fc14d1a1f0edde492b18c44f43cb7376ca632dbfb5bdd85", 0xaa}, {&(0x7f00000003c0)="7e52e3e5b66dd6aaa79d5db863bf6f6c24e589443ed874c3051c7af02aaa213f68e53791a8aea91ccf9c16186a01c0f80d2828d5d5232b69097ce7441eaebf26a6f4f3135c2c29975e09fe5a2993dd83cb0bf78086bf584c1a533e6051e39eabed8c5aec917aab7516e3f6e0e8724caddd2610e766d045ec4560cddb8c973c98059e", 0x82}, {&(0x7f0000000480)="abba8a1a790acd260811", 0xa}, {&(0x7f00000004c0)="a7ca77400d7082039ee9efc53aacfaf38215fcf75140e1c37541a0d91b397fa7faf05dde48f815264df746512137a8b4eba52377b2b6e3c68b331380fed75e19feccd993c2d684bb94cf4060b07fc8e5ffee310751cd6a8e5feeff5d0b8aad9e36192bde3b5636229e0161a0a96ea36c675a81642a9f47ec27d0e771546e63409723146ab9b27a4981a5e08aebdc6231ec43c548e1253bba4338119d8a7423226c87f6161b010f4edfde26d343bda38c8c10a89be4", 0xb5}], 0x7, &(0x7f0000000600)=[@ip_retopts={{0x8c, 0x0, 0x7, {[@cipso={0x86, 0x37, 0x40, [{0x0, 0xf, "22f3e3fb272b94d6555478174d"}, {0x7, 0xb, "502ad70f5f1a01bfd0"}, {0x7, 0x4, "9dbe"}, {0x2, 0x4, 'y$'}, {0x7, 0xd, "0e65698d931ed130696d27"}, {0x0, 0x2}]}, @rr={0x7, 0x7, 0x0, [@empty]}, @ra={0x94, 0x6, 0x9}, @ssrr={0x89, 0xf, 0x30b, [@dev={0xac, 0x14, 0x14, 0x12}, @multicast2, @empty]}, @ra={0x94, 0x6, 0x8}, @ssrr={0x89, 0xb, 0x7ce41dae, [@remote, @dev={0xac, 0x14, 0x14, 0x2a}]}, @ssrr={0x89, 0xf, 0xfffffffffffffff7, [@rand_addr=0x3, @rand_addr=0x2, @broadcast]}, @ra={0x94, 0x6, 0x3}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1e6}}, @ip_retopts={{0xb4, 0x0, 0x7, {[@rr={0x7, 0x23, 0x4, [@dev={0xac, 0x14, 0x14, 0x13}, @multicast2, @local, @multicast1, @rand_addr=0xfffffffeffffffff, @loopback, @dev={0xac, 0x14, 0x14, 0x27}, @remote]}, @noop, @rr={0x7, 0x1f, 0x5, [@rand_addr=0x7, @loopback, @multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0xb}, @rand_addr=0x5, @multicast1]}, @cipso={0x86, 0x2e, 0xffffffff, [{0x5, 0x7, "8290c78bf4"}, {0x7, 0x10, "684c111e1b932ceddb52e9756f2a"}, {0x7, 0x8, "5302fed3f4de"}, {0x1, 0x6, "9099912d"}, {0x1, 0x3, ';'}]}, @noop, @noop, @rr={0x7, 0x1b, 0xb5d, [@dev={0xac, 0x14, 0x14, 0x25}, @local, @rand_addr=0x4, @initdev={0xac, 0x1e, 0x1, 0x0}, @dev={0xac, 0x14, 0x14, 0x1f}, @multicast1]}, @lsrr={0x83, 0x13, 0x9, [@multicast2, @rand_addr=0x7fffffff, @dev={0xac, 0x14, 0x14, 0x12}, @local]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xffffffff}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}], 0x190}, 0x4800) 23:16:22 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="020085ffffff01000000ff060000000000000f26000000000000cbfed81b00000000420000000000000000000000000000000000000000000000f595000055aa", 0x40, 0x1c0}]) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x20000, 0x0) getsockopt$netrom_NETROM_T4(r0, 0x103, 0x6, &(0x7f0000000040)=0x7569, &(0x7f00000000c0)=0xfffffffffffffc6c) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) 23:16:22 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000023000000006104780000000000660000000000de000000000000000700"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) vmsplice(r0, &(0x7f0000001380)=[{&(0x7f0000000080)="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", 0xfa}, {&(0x7f0000000180)="820ac23238d793bfd1b16e8d607c52710fcff25f2fac141a04bdc89a348bdf661ba28c7ea714c7cb9fc4ad84f0743cb8ed81c7f9", 0x34}, {&(0x7f0000001440)="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", 0x154}, {&(0x7f0000000280)="65ef6a30a5585744bccb7f7618ac1223d24dcf472f6ab5df7445edc761b5ad3ab438ba03094397025c70c0deee3caaaaecc07e9f5b70398eeeab31c5bfb5070c6d674cd5d70746aebc861c91d71648186c15b2", 0x53}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000001300)="f682c9012b00aaa4d8d6619579780f7f822c6209742e4683aa97f7355656a4fee829c6e76c1a8bbeae7656119e6215866cf8ab62bcbc3851ed66afe1a226a2ce1c3db0f9693f8f823d9adc0ad9e7e7da6f790cfc9dc585ef32150b8c0deb09ece2b5c695c5a0525d", 0x12}], 0x6, 0x2) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000001400)='/dev/btrfs-control\x00', 0x18040, 0x0) [ 250.904327][ T9892] SELinux: duplicate or incompatible mount options 23:16:22 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x7, &(0x7f00000000c0)="f1db867000000000000000") r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0xfffffffffffffed9, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="4000000010000100"/20, @ANYRES32=0x0, @ANYBLOB="00000000800000000c000200aaaaaaaaaa000000140003006272696467655f736c6176655f310000"], 0x40}}, 0x0) 23:16:22 executing program 1: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff, 0x0) connect$x25(r1, &(0x7f0000000000)={0x9, @remote={[], 0x0}}, 0x12) accept$ax25(r0, &(0x7f00000001c0)={{0x3, @rose}, [@remote, @remote, @default, @default, @default, @default, @null, @bcast]}, &(0x7f0000000180)=0x4) [ 251.021663][ T9899] ldm_validate_privheads(): Disk read failed. 23:16:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)={0x10}) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) [ 251.084291][ T9899] loop3: p1 < > p2 < p5 > p4 [ 251.089791][ T9899] loop3: partition table partially beyond EOD, truncated [ 251.141368][ T9899] loop3: p1 start 1 is beyond EOD, truncated [ 251.148550][ T24] audit: type=1400 audit(1561936583.110:59): avc: denied { prog_load } for pid=9912 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 23:16:23 executing program 0: pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffff7f) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/btrfs-control\x00', 0x109000, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r0, 0x810c5701, &(0x7f0000000040)) [ 251.191099][ T9899] loop3: p2 size 2 extends beyond EOD, truncated [ 251.213718][ T9899] loop3: p4 size 38389 extends beyond EOD, truncated 23:16:23 executing program 2: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x101402, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x4, 0x2, 0x4, 0x7, 0x0, 0x400, 0x2000a, 0x4, 0x10000, 0x8, 0x2, 0x1, 0xfff, 0x5, 0x4, 0x3fb, 0x200, 0x7, 0x80, 0x1ff, 0x3, 0x200, 0x0, 0x0, 0xfffffffffffffffa, 0x70000000, 0x100000000, 0x101, 0x9, 0x800, 0x7ff, 0x0, 0x80000003, 0x4760, 0x7, 0xff, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000100)}, 0x2100, 0x7f, 0x1, 0x7, 0x100000001, 0x8, 0x2}, 0xffffffffffffffff, 0x1, 0xffffffffffffff9c, 0x1) ioctl$RTC_PIE_ON(r0, 0x7005) socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000140)='ns/cgroup\x00') mmap(&(0x7f0000602000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x8) migrate_pages(0x0, 0x7, &(0x7f0000000180)=0x7fffffff, &(0x7f0000000200)=0x81) [ 251.256156][ T9899] loop3: p5 size 38389 extends beyond EOD, truncated 23:16:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x8000000000000f, &(0x7f0000000080)=0xfffffffffffffcf7, 0xfffffffffffffed3) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:16:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f00000000c0)='memory.high\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000180)=ANY=[], 0x346) getsockname(r0, &(0x7f00000002c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000340)=0x80) getsockname$packet(r0, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000400)={@ipv4={[], [], @loopback}, 0x49, r4}) r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x1, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x0, 0xd}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r5, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f0000000000), 0x4, r6, 0x30, 0x1, @ib={0x1b, 0x5, 0x6, {"4a3a53af1f210f8a93a4dfce2fb9d887"}, 0x39c, 0x0, 0x6f}}}, 0xa0) getsockopt$bt_BT_RCVMTU(r5, 0x112, 0xd, &(0x7f0000000100)=0x401, &(0x7f0000000140)=0x2) [ 251.413411][ T9930] QAT: Invalid ioctl [ 251.419723][ T9925] SELinux: duplicate or incompatible mount options [ 251.457301][ T24] audit: type=1400 audit(1561936583.410:60): avc: denied { create } for pid=9929 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:16:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r3, &(0x7f0000003500)=[{&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f0000000380)=""/114, 0x72}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/4096, 0x1000}, {&(0x7f0000003400)=""/251, 0xfb}], 0x6, 0x49) [ 251.598584][ T9930] QAT: Invalid ioctl 23:16:23 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) write(r0, &(0x7f0000000280)="052e9d3447bdddc47e81b1ee6ce03368eb52878d42f2fb08f96a23b015a5e7f8c50edcd4c8ee00a16eeb7e55b5325ba7cc4ea8c117917aa38a690f9e8102b89d380fb5303cbb1393f2016de5c1aa55d9ddfef9a41d3e4fc501a1fc413f4cedb2f8d6d7d526721a5fcfe6decc3a68d9fac70ad19459e0aac30cfae3adc3699f68c3ea8161b47e5645e6dcf234a470cc11bd8ef774f8773ca82271c73d233d0de32e3beaea2903b9deb84798ab57df29b0a23eb1ca21ed94293ca6c199a39573581e0f96e15581", 0xc6) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:23 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) socket$rxrpc(0x21, 0x2, 0xa) io_setup(0x5, &(0x7f00000000c0)=0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0xfffffffffffffffb, 0x20000) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000080)='dctcp\x00', 0x6) syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0x8000, 0xa000) getresuid(&(0x7f0000000140)=0x0, &(0x7f0000000180), &(0x7f00000001c0)) ioprio_set$uid(0x3, r3, 0x1ff) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="c0dca5055e0bcfec7be070") io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, r0, 0x0}]) 23:16:23 executing program 5: r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r1, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0x2, 0x0, @local={0xac, 0x214}}, 0xffd6, &(0x7f0000000640), 0x98, &(0x7f0000000180)=[{0x20, 0x84, 0x2}], 0x20}, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_DIRENT(r2, &(0x7f0000000040)={0xb8, 0x0, 0x4, [{0x0, 0xfff, 0xa, 0x4, 'eth1*(bdev'}, {0x3, 0x6, 0x1, 0x5, '\''}, {0x0, 0x4a46, 0x1, 0x7, '{'}, {0x6, 0x7, 0x0, 0x8}, {0x1, 0x3, 0xb, 0x6e8c, 'eth1keyring'}]}, 0xb8) ioctl$VIDIOC_ENUM_DV_TIMINGS(r2, 0xc0945662, &(0x7f0000000200)={0x0, 0x0, [], {0x0, @reserved}}) 23:16:23 executing program 1: r0 = socket$inet6(0xa, 0x1000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x8000000000000f, &(0x7f0000000080)=0xfffffffffffffcf7, 0xfffffffffffffed3) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:16:23 executing program 2: r0 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x800, 0xa0200) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0x5, 0x4) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/229) [ 251.887239][ T9956] SELinux: duplicate or incompatible mount options 23:16:24 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0x40000000}) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:24 executing program 2: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000200)='configfs\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x220000) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x8000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, r1, 0x3, 0x2}, 0x10) mount$overlay(0x400000, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)='overlay\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="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"]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r2, 0x0, 0x0) getdents64(r2, &(0x7f0000000340)=""/158, 0x9e) 23:16:24 executing program 5: r0 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) connect$inet6(r0, &(0x7f0000001080)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r1 = dup3(r0, r0, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000001140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000010c0)={0xffffffffffffffff}, 0x111, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f0000001180)={0x10, 0x30, 0xfa00, {&(0x7f0000000040), 0x2, {0xa, 0x4e22, 0x6, @empty, 0xb5e}, r2}}, 0x38) getsockopt$bt_hci(r0, 0x84, 0xa, &(0x7f0000000080)=""/4096, &(0x7f0000001100)=0x801) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x2, 0x32, 0xffffffffffffffff, 0x0) 23:16:24 executing program 3: r0 = timerfd_create(0x0, 0x0) unshare(0x400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000040)={{{@in6=@mcast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000180)=@v3={0x3000000, [{0x8, 0x7}, {0x2}], r1}, 0x18, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) timerfd_settime(r0, 0x3, &(0x7f0000005000)={{}, {0x0, 0x989680}}, 0x0) 23:16:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x8000000000000f, &(0x7f0000000080)=0xfffffffffffffcf7, 0xfffffffffffffed3) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 252.217061][ T9987] SELinux: duplicate or incompatible mount options [ 252.295847][ T9990] overlayfs: failed to resolve 'æ‰0': -2 23:16:24 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x3, 0x40) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x8000000000000f, &(0x7f0000000080)=0xfffffffffffffcf7, 0xfffffffffffffed3) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) 23:16:24 executing program 3: r0 = syz_open_dev$vivid(&(0x7f0000000040)='/dev/video#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05605, &(0x7f0000000080)={0x1, @vbi={0x0, 0x0, 0x32344d59, 0x0, [], [], 0x0, [0x0, 0x4247523400000000]}}) ioctl$VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x4, 0x1, 0x2}) 23:16:24 executing program 2: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='fuse.', 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getpeername$netlink(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) 23:16:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000000)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(0xffffffffffffffff, 0xc0905664, &(0x7f00000002c0)={0x0, 0x0, [], @bt={0x0, 0x0, 0xffffffffc496a437}}) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000013000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r3, &(0x7f0000003500)=[{&(0x7f0000000100)=""/176, 0xb0}, {&(0x7f0000000380)=""/114, 0x72}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/4096, 0x1000}, {&(0x7f0000003400)=""/251, 0xfb}], 0x6, 0x49) [ 252.550721][T10004] SELinux: duplicate or incompatible mount options 23:16:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000080)="39000000130009006900000000000000ab00800010000000000000070000001419000a0010000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x200, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000200)=@newlink={0x34, 0x10, 0xcc70f7c46e283195, 0x0, 0x0, {}, [@IFLA_BROADCAST={0xc, 0x4}, @IFLA_GROUP={0x8}]}, 0x34}}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000100)={0x0, 0xfffffffffffffffc, 0x30}, &(0x7f0000000140)=0xc) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000180)={r3, 0x29, 0x7ff}, 0x8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r1, 0xc0045540, &(0x7f00000000c0)=0x81) 23:16:24 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x8, 0x92, 0x1f, 0x4000800000}, {0x6, 0x101, 0x3, 0xc5fa}, {0x7fffffff, 0x7f, 0x1ff, 0xb14000}, {0xa2f, 0x8be, 0x7, 0x2}]}) lsetxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64IPOUT\x00', &(0x7f0000000100)='*%vmnet0vboxnet1!(^\x00', 0x14, 0x1) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x410000, 0x0) syz_mount_image$erofs(&(0x7f0000000800)='erofs\x00', &(0x7f0000000840)='./file0\x00', 0x0, 0x2, &(0x7f0000000900)=[{&(0x7f0000000880)="a24aaf48a9c157ee09659399c3cf821cd25593a24d2ee7ff6d1f92073f40", 0x1e, 0x40}, {&(0x7f00000008c0)="09526e16ea0a886f9a1672b9c0383a807dc6e6", 0x13, 0x5}], 0x800, &(0x7f0000000940)={[{@nouser_xattr='nouser_xattr'}, {@acl='acl'}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel='seclabel'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'selfuser'}}, {@subj_type={'subj_type', 0x3d, '$userem1trusted*]'}}, {@appraise='appraise'}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) 23:16:24 executing program 1: r0 = socket$inet6(0xa, 0x1000000001, 0x0) setsockopt$sock_int(r0, 0x1, 0x8000000000000f, &(0x7f0000000080)=0xfffffffffffffcf7, 0xfffffffffffffed3) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x33, &(0x7f0000000300)={0x1, &(0x7f00000002c0)=[{0x6}]}, 0x10) [ 252.743317][T10017] WARNING: CPU: 1 PID: 10017 at drivers/media/common/videobuf2/videobuf2-core.c:733 vb2_core_reqbufs+0x48f/0xd90 [ 252.755485][T10017] Kernel panic - not syncing: panic_on_warn set ... [ 252.762089][T10017] CPU: 1 PID: 10017 Comm: syz-executor.3 Not tainted 5.2.0-rc7 #39 [ 252.763147][T10018] kobject: 'kvm' (00000000943bb007): kobject_uevent_env [ 252.769972][T10017] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 252.769992][T10017] Call Trace: [ 252.770020][T10017] dump_stack+0x172/0x1f0 [ 252.770048][T10017] ? vb2_core_reqbufs+0x450/0xd90 [ 252.799653][T10017] panic+0x2cb/0x744 [ 252.803562][T10017] ? __warn_printk+0xf3/0xf3 [ 252.808171][T10017] ? vb2_core_reqbufs+0x48f/0xd90 [ 252.813208][T10017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.819465][T10017] ? __warn.cold+0x5/0x4d [ 252.823811][T10017] ? vb2_core_reqbufs+0x48f/0xd90 [ 252.828855][T10017] __warn.cold+0x20/0x4d [ 252.830015][T10018] kobject: 'kvm' (00000000943bb007): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 252.833111][T10017] ? vb2_core_reqbufs+0x48f/0xd90 [ 252.833132][T10017] report_bug+0x263/0x2b0 [ 252.833152][T10017] do_error_trap+0x11b/0x200 [ 252.833170][T10017] do_invalid_op+0x37/0x50 [ 252.833184][T10017] ? vb2_core_reqbufs+0x48f/0xd90 [ 252.833204][T10017] invalid_op+0x14/0x20 [ 252.870383][T10017] RIP: 0010:vb2_core_reqbufs+0x48f/0xd90 [ 252.876019][T10017] Code: 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 34 08 00 00 45 8b 3c 9c 31 ff 44 89 fe e8 8b 38 b6 fc 45 85 ff 75 9a e8 01 37 b6 fc <0f> 0b 41 bc ea ff ff ff e8 f4 36 b6 fc 48 b8 00 00 00 00 00 fc ff [ 252.895625][T10017] RSP: 0018:ffff88805992f8a0 EFLAGS: 00010216 [ 252.901691][T10017] RAX: 0000000000040000 RBX: 0000000000000000 RCX: ffffc9000c466000 [ 252.909746][T10017] RDX: 000000000000628f RSI: ffffffff84ba8c3f RDI: 0000000000000005 [ 252.918150][T10017] RBP: ffff88805992f9b0 R08: ffff888058a44400 R09: ffff88809e92e888 [ 252.926116][T10017] R10: ffffed1013d25d18 R11: ffff88809e92e8c7 R12: ffff88805992f928 [ 252.934085][T10017] R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000000 [ 252.942093][T10017] ? vb2_core_reqbufs+0x48f/0xd90 [ 252.947138][T10017] ? vb2_core_create_bufs+0x830/0x830 [ 252.952516][T10017] ? mutex_trylock+0x1e0/0x1e0 [ 252.957290][T10017] ? mark_held_locks+0xf0/0xf0 [ 252.962053][T10017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 252.968297][T10017] vb2_ioctl_reqbufs+0x2c2/0x450 [ 252.973237][T10017] v4l_reqbufs+0xa7/0xd0 [ 252.977479][T10017] __video_do_ioctl+0x7eb/0xcd0 [ 252.982333][T10017] ? v4l_s_fmt+0xab0/0xab0 [ 252.986750][T10017] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 252.992984][T10017] ? _copy_from_user+0xdd/0x150 [ 252.997836][T10017] video_usercopy+0x4c2/0x10c0 [ 253.002599][T10017] ? v4l_s_fmt+0xab0/0xab0 [ 253.007022][T10017] ? v4l_enumstd+0x70/0x70 [ 253.011452][T10017] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 253.017696][T10017] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 253.023514][T10017] ? video_usercopy+0x10c0/0x10c0 [ 253.028537][T10017] video_ioctl2+0x2d/0x35 [ 253.032864][T10017] v4l2_ioctl+0x150/0x1b0 [ 253.037190][T10017] ? video_devdata+0xa0/0xa0 [ 253.041776][T10017] do_vfs_ioctl+0xd5f/0x1380 [ 253.046466][T10017] ? ioctl_preallocate+0x210/0x210 [ 253.051580][T10017] ? selinux_file_mprotect+0x620/0x620 [ 253.057037][T10017] ? __fget+0x381/0x550 [ 253.061201][T10017] ? ksys_dup3+0x3e0/0x3e0 [ 253.065626][T10017] ? nsecs_to_jiffies+0x30/0x30 [ 253.070482][T10017] ? tomoyo_file_ioctl+0x23/0x30 [ 253.075423][T10017] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 253.081673][T10017] ? security_file_ioctl+0x8d/0xc0 [ 253.090029][T10017] ksys_ioctl+0xab/0xd0 [ 253.094204][T10017] __x64_sys_ioctl+0x73/0xb0 [ 253.098895][T10017] do_syscall_64+0xfd/0x680 [ 253.103407][T10017] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 253.109298][T10017] RIP: 0033:0x459519 [ 253.113194][T10017] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 253.132808][T10017] RSP: 002b:00007fd65139ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 253.141229][T10017] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459519 [ 253.150955][T10017] RDX: 0000000020000000 RSI: 00000000c0145608 RDI: 0000000000000003 [ 253.158940][T10017] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 253.166923][T10017] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd65139f6d4 [ 253.174989][T10017] R13: 00000000004c495d R14: 00000000004d8918 R15: 00000000ffffffff [ 253.185377][T10017] Kernel Offset: disabled [ 253.190885][T10017] Rebooting in 86400 seconds..