tmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(0x0, &(0x7f0000000100)='security.SMACK64\x00', &(0x7f0000000180)='/dev/fuse\x00', 0xa, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:53 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:07:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 843.439541] audit: type=1400 audit(1548644873.294:187): avc: denied { create } for pid=22517 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:07:53 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) removexattr(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)=@known='com.apple.system.Security\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x22080800}, 0xc, &(0x7f0000000380)={&(0x7f0000001640)=ANY=[@ANYBLOB="80a330c4db8c13826bbd42ec24ec29b7afcbd04ce9e9699ff96d72480900000000000000ec7d0b929d5e64631fb075bc397a82dad58f7b6abaaa3cc01dc18a5c809c6603d449a0821dbccd181e33556cd1fd65c9810ff4bf1952248531f8b825b617bbbfcf1d46482d31ab19a8a009892c0dd3b356dffcde7765beeebdb6e89f4074f46b560eb4cfa2a1b021608d8aac84cd839275c6ada3a7908a587dfe4eee0d071c9ef8a762b6c1d4d32862a6c048784956a75e", @ANYRES16=r2, @ANYBLOB="00002abd7000fbdbdf25030000001800020014000100fe8000000000000000000000000000232c0001000800080008000000080002007b0000000800080004000000080009000000000008000900250000001c000200080008003a00000008000400dd900000080002004e210000"], 0x74}}, 0x48010) [ 843.465668] audit: type=1400 audit(1548644873.314:188): avc: denied { create } for pid=22517 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:07:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653df45b8d473030303030303030303034303030302c000000000000ae3b2a262b311399b4df24f99e58b91b090000020000", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) prctl$PR_SET_MM(0x23, 0xb, &(0x7f0000ff9000/0x4000)=nil) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000001480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x6}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x600100, 0x0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/93) [ 843.491504] audit: type=1400 audit(1548644873.314:189): avc: denied { write } for pid=22517 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 843.714096] audit: type=1400 audit(1548644873.564:190): avc: denied { read } for pid=22517 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:07:54 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 843.925130] audit: type=1400 audit(1548644873.774:191): avc: denied { read } for pid=22517 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:07:54 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000180), 0x4) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) geteuid() mount$fuseblk(0x0, 0x0, &(0x7f00000000c0)='fuseblk\x00', 0x20, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) getpeername$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @rand_addr="2d0be1aa0334b10da0ec57702dbec84b", 0x8000}, 0x1c) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) inotify_init1(0x800) write$UHID_CREATE2(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) 03:07:54 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(0x0, &(0x7f0000000100)='security.SMACK64\x00', &(0x7f0000000180)='/dev/fuse\x00', 0xa, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000180)) fcntl$getownex(r0, 0x10, &(0x7f00000001c0)) r1 = getpgrp(0x0) r2 = getpgid(r1) syz_open_procfs$namespace(r2, &(0x7f0000000040)='ns/cgroup\x00') getgroups(0x3, &(0x7f0000000080)=[0xee01, 0xee00, 0xffffffffffffffff]) r4 = getuid() mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000002480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[], [{@uid_gt={'uid>', r4}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user_id'}}, {@permit_directio='permit_directio'}, {@subj_user={'subj_user'}}, {@context={'context', 0x3d, 'user_u'}}]}}) read$FUSE(r0, &(0x7f0000001480), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000005580), 0xffffffffffffff2c) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:54 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 844.674505] audit: type=1400 audit(1548644874.524:192): avc: denied { create } for pid=22564 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:07:54 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 844.869981] audit: type=1400 audit(1548644874.724:193): avc: denied { write } for pid=22564 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:07:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000180)='/dev/fuse\x00', 0xa, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x20800, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 845.362872] audit: type=1400 audit(1548644875.214:194): avc: denied { read } for pid=22564 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:07:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:07:55 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x1) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='^']) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) symlinkat(&(0x7f0000000180)='./file0\x00', r1, &(0x7f00000001c0)='./file0\x00') setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000001480)='trusted.overlay.nlink\x00', &(0x7f00000014c0)={'U-', 0x1}, 0x28, 0x2) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000100)={0x2, 0xfffffffffffffffc, 0x8, 0x7f, 0x10, 0x0, 0x9, 0x4893879c, 0x3ff, 0x9, 0xfffffffffffffffa, 0x1ff}) read$FUSE(r0, &(0x7f0000000480), 0x1000) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000200)={'ipddp0\x00', {0x2, 0x4e21, @local}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:55 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000200), 0x4) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001480)=ANY=[@ANYBLOB="73c4a2c5ee97c8f11456cc3e77419e402154060ddf43dd8b46e71a876a1be891a53ba97c31bb817e3ac26cb35fb296649143279585c97d2ca981314d31fd6e4495acbf9d1061b476bf0ac467582de804b151c484025175cf4203e33fe5367dd8ec37f5533c6ee7937bc6189c6ad5a920eb089d5d10770fb00df7c7a3232346ce6e37c877c7f46b474b57aef0192ff8de50ffc4e09dc1871a5f2e2d79"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:57 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB="24f7b66d31bd4588ec7500ca9f3b17f8057be7bf45e4763c2583ae9cc34d7fae3c8604001900", @ANYRES32=0x0], 0x24}}, 0x0) 03:07:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:07:57 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getgroups(0x2, &(0x7f0000000080)=[0xee00, 0x0]) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653dcf3985ecb466a83030303030efa0a9409f8c300130303030", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=r1, @ANYBLOB=',allow_other,max_read=0x0000000000000101,max_read=0x000000000000b8dd,\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2, 0x6}, 0x1c) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000100)) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x0, @broadcast}, 0x80, 0x0}}], 0x1, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast1, 0x2000000000005}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") sendto$inet6(r3, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @ipv4={[], [], @multicast2}}, 0x1c) sendmmsg(r3, &(0x7f00000092c0), 0x4ff, 0x0) sendmmsg(r2, &(0x7f0000000440), 0x2c4, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) recvfrom(r2, &(0x7f0000000380)=""/37, 0x25, 0x40000020, &(0x7f00000003c0)=@nfc={0x27, 0x1, 0x0, 0x6}, 0x80) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000180)='/dev/fuse\x00', 0xa, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:57 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x20000003, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:57 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:07:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 848.372353] selinux_nlmsg_perm: 40 callbacks suppressed [ 848.372363] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=48433 sclass=netlink_route_socket pig=22641 comm=syz-executor1 03:07:58 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_mount_image$msdos(&(0x7f0000000140)='msdos\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001540)='/dev/rtc0\x00', 0x80040, 0x0) 03:07:58 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000180)='/dev/fuse\x00', 0xa, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:07:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001740)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='roup_id=\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',default_permissions,default_permissions,max_read=0xffffffffffff8001,max_read=0x0000000000007f23,blksize=0x0000000000000400,default_permissions,default_permissions,blksize=0x0000000000001000,default_permissions,\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:59 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x48) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001700)=ANY=[@ANYPTR=&(0x7f0000000180)=ANY=[@ANYRES64=r0]]) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) execve(&(0x7f0000000080)='./file0\x00', &(0x7f00000016c0)=[&(0x7f0000001680)='user_id'], &(0x7f00000015c0)=[&(0x7f00000001c0)='\x00', &(0x7f0000000200)='{wlan0\x00', &(0x7f0000000380)=')T-:-\x00', &(0x7f00000003c0)='vboxnet0wlan1\x00', &(0x7f0000001480)='\x00', &(0x7f00000014c0)='user_id', &(0x7f0000001500)='rootmode', &(0x7f0000001540)='user_id', &(0x7f0000001580)='user\x00']) prctl$PR_CAPBSET_DROP(0x18, 0x4000000) 03:07:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:59 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000040)=0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x424200, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000140)={@mcast1, 0x3f, r3}) creat(&(0x7f0000000000)='./file0\x00', 0x0) rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) setrlimit(0x1, &(0x7f0000011000)) io_submit(r1, 0x1400, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x2000072e}]) 03:07:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:07:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x242100, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r1, 0x8934, &(0x7f0000000100)={'ip6_vti0\x00', 0x7}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:07:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f6965cc", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000005000), 0x737) write$FUSE_INIT(r0, &(0x7f0000000000)={0x50, 0x0, 0x1}, 0x50) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x1, 0x0, 0x3}}, 0x30) 03:08:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x9}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x81) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f0000000100)={0x2a, 0x18, 0x5, 0x1a, 0x4, 0x6, 0x5, 0xb9, 0xffffffffffffffff}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_WRITE(r1, &(0x7f0000000100)={0x18, 0x0, 0x3}, 0x18) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:00 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000001000)=[{&(0x7f00000000c0)="1203", 0x2}], 0x1, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f0000000340)=""/246) setsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f0000000000)="01dae19f37c433b2bda0fe514a89d838b10083b746e13b666b436c1e5bbd51c8d3c5d4cd90087db1115a96396c4e73519944380acf11bc241888c88748849982fae4a9a8cd3de2cc2a38b15b5764a4c406c3d64162ca29131944fd2e0556e8743aed730b868c7e4ae651f4c1f6f732e3838a7d46aac9b838ca69895d3e0f4f9f3c38fff284274431d2295c999a0ff847", 0x90) ioctl$EVIOCGREP(r0, 0x4010744d, &(0x7f0000001000)=""/174) 03:08:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001480)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000100)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001580)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000200)=0xe8) lstat(&(0x7f0000000380)='\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() stat(&(0x7f0000001780)='./file0\x00', &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000001840)='./file0\x00', &(0x7f0000001880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x4, &(0x7f0000001900)=[0x0, 0x0, 0xee00, 0x0]) getgroups(0x6, &(0x7f0000001940)=[0xee01, 0xee00, 0x0, 0xee00, 0xffffffffffffffff, 0xee00]) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f0000001980)={{}, {0x1, 0x3}, [{0x2, 0x1, r1}, {0x2, 0x2, r2}, {0x2, 0x4, r3}, {0x2, 0x5, r4}, {0x2, 0x4, r5}], {0x4, 0x1}, [{0x8, 0x5, r6}, {0x8, 0x2, r7}, {0x8, 0x1, r8}, {0x8, 0x4, r9}, {0x8, 0x2, r10}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x807fd) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x6) ptrace(0x4207, r1) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) ptrace$setregset(0x4209, r1, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) tkill(r1, 0x1a) 03:08:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:02 executing program 1: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) fadvise64(r2, 0x0, 0x9, 0x3) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:08:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = accept4$packet(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x80000) accept$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) write$P9_ROPEN(r2, &(0x7f0000000100)={0x18, 0x71, 0x2, {{0x0, 0x2, 0x2}, 0x3}}, 0x18) 03:08:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x402080, 0x0) write$P9_RWALK(r1, &(0x7f0000000180)={0x57, 0x6f, 0x1, {0x6, [{0x4, 0x1, 0x5}, {0x9, 0x0, 0x1}, {0x80, 0x2}, {0x0, 0x3, 0x8}, {0x0, 0x0, 0x3}, {0x1, 0x1}]}}, 0x57) read$FUSE(r0, &(0x7f0000000480), 0xfffffffffffffe23) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x4) write$FUSE_INIT(r0, &(0x7f0000000180)={0xfffffffffffffe16, 0x0, 0x1, {0x7, 0x1b, 0x457ff47d, 0x0, 0x2}}, 0xffffffffffffff9e) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:04 executing program 1: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)={0xa, 0x2, 0x914, 0x4000000005, 0x0, 0xffffffffffffffff, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r1, &(0x7f0000000000), 0x0}, 0x20) fcntl$getown(r1, 0x9) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000040)={r1, &(0x7f0000000000), 0x0, 0x2}, 0x20) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/relabel\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000800)=ANY=[], 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000280)=0xc) r5 = perf_event_open(&(0x7f0000000100)={0x5, 0x70, 0xfffffffffffffffd, 0x8, 0x1f, 0xa3, 0x0, 0x15, 0x10000, 0x4, 0xbf, 0xb796, 0x6, 0x1f, 0x5, 0x3, 0x100000000, 0x401, 0x64, 0x0, 0x3296, 0x1, 0x1f, 0xbf, 0x9, 0x4, 0x2, 0x3, 0x5, 0x2, 0x7, 0x0, 0x8, 0xd4f0, 0x1, 0xda3, 0x80000000, 0x5, 0x0, 0x1, 0x2, @perf_config_ext={0x4, 0x13}, 0x1000, 0x7, 0x2b5d, 0x0, 0x6, 0x10000, 0x3}, r4, 0xc, r3, 0x9) sched_setattr(0x0, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000300)={{0x2, 0x4e24, @rand_addr=0x5}, {0x1}, 0x22, {0x2, 0x4e21, @empty}, 'yam0\x00'}) mlockall(0x41000002) fcntl$getownex(r5, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r7 = signalfd4(r1, &(0x7f0000000200)={0x5}, 0x8, 0x800) creat(&(0x7f00000001c0)='./file0\x00', 0x82) prlimit64(r6, 0xf, 0x0, &(0x7f0000000240)) r8 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000bc0)=ANY=[], 0x0) write$binfmt_elf64(r8, &(0x7f0000000080)=ANY=[], 0x1da) fallocate(r8, 0x0, 0x7fff, 0x4003ff) getresuid(&(0x7f0000000640)=0x0, &(0x7f0000000680), &(0x7f0000000700)) r10 = add_key(&(0x7f0000000540)='user\x00', &(0x7f0000000580)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) r11 = request_key(&(0x7f0000000500)='syzkaller\x00', &(0x7f0000000a40)={'syz', 0x0}, &(0x7f00000004c0)='@^\\usernodev\'C)bdev\x00', r10) keyctl$get_persistent(0x16, r9, r11) write$cgroup_type(r8, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r7, 0x3, 0x5e89, 0xfff9) write$P9_RREADLINK(r8, &(0x7f0000000ac0)=ANY=[@ANYBLOB="10000000176c0007002e2f66696c65317cdeee70d6924976b4094a54908407f096a88c87375700a736114db5b7e6b03f88040000022bdf0ce686d1f686a3"], 0x3e) unshare(0x40000000) 03:08:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c008e3982ab4b026d022ba9403d977153d06e440cde4663f480d68879091832242f6ad213f72ac963de0df61ebdc9cef5d75ebeeeab22beab432b4e9ce003e08bd8a7848ff07342ccf27b00b9e71655a8eb43387e1670bfe39228d16c"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0xfffffffffffffffc, 0x5, {0x7, 0x1b, 0x0, 0xffffffffffffffff, 0x0, 0x3}}, 0x50) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000100)=@req3={0x7fff, 0x10000, 0x13, 0x7, 0x4, 0xffff, 0x1ff}, 0x1c) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="73b02c70ce194ec1fe005e306d2158c65c95172498880ea61d4d752b4035b690136b079be0f7d284"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 855.143512] audit_printk_skb: 6 callbacks suppressed [ 855.166502] audit: type=1400 audit(1548644884.994:197): avc: denied { map_create } for pid=22788 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="f3cfb5d39d28a6de4d9a4c535a84f2616d26fc7053c155242a8740c328497163c4182d991f0887ad6c392f1401c02f29e3a2137dcffeefa9f05e5c252cd9cc7c02043c3b983c10547beb7f04474589c9652ca0826f0d25493cc2393b70a51208b9fbaa429d6742a760f6eceeb8f9e2be8620792f3b8a72233dcaf4624cddf6e2d4cbe487de8161af6dac79b258ef16d9af429e7bfdd0"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 855.571613] audit: type=1400 audit(1548644885.424:198): avc: denied { map_create } for pid=22788 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000100)={0xbb, @multicast1, 0x4e20, 0x0, 'none\x00', 0x1, 0x5, 0x60}, 0x2c) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20}, {0x6}]}, 0x10) sendmmsg(r1, &(0x7f0000004500), 0x3fffe65, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 03:08:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="8a673d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000380)={0x22, 0x3, 0x0, {0xfffffffffffffffe, 0x1, 0x0, '\x13\x96\xb2\xce\x02\xfd~\xdb\x8f\xc5@\x9e\x04\xb5R%.]\xd8\xdfwn\xbb\xc7=L/\xf5g\xcd\x1d\xbf\xe6Lm\xc0\'z\xd5\x98\xe6]\x86'}}, 0xffffffffffffffcb) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) pwrite64(r0, &(0x7f0000000180)="275e2b2486e87715cdd049a683eb585fd5652e45a3ee8c93a361bdc5825752119c13509441b7b28c3998ff2846246be114356dadfa58622f90623150d01b0a2d2836294d57ee8abdb3c66245808f0befff75772a3e6131477e15d987289b4382c6fb2a7bbdaf1eff1ef976567b3bbec8f5542c460fb8c03ac90f43c1f30cfc392a8999df1667b10e14060c47882b8cdbccf54fb0de54f5c99c27", 0x9a, 0x0) 03:08:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000180)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x80, 0x800) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') llistxattr(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)=""/83, 0x53) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000001480)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x0, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x90}, 0x1) 03:08:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:07 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001f88)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000bf0000/0x2000)=nil, 0x2000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)=0x0) ptrace$setopts(0x4200, r2, 0x3, 0x5) mmap(&(0x7f0000941000/0x2000)=nil, 0x2000, 0x0, 0x4011, r0, 0x0) 03:08:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:07 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(r1, 0x6, 0x1b, &(0x7f0000000100)=0x5, 0x4) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) mkdirat$cgroup(r2, &(0x7f0000001500)='syz0\x00', 0x1ff) prctl$PR_SET_TSC(0x1a, 0x2) write$P9_RREADLINK(r2, &(0x7f0000000040)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000200)='nbd\x00') sendmsg$NBD_CMD_STATUS(r2, &(0x7f00000014c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x202}, 0xc, &(0x7f0000001480)={&(0x7f0000000380)={0x48, r3, 0x422, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x8}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x1}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000080}, 0x40) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xfffffffffffffffd, 0x2}, 0x10) r4 = gettid() ptrace$getregs(0xc, r4, 0x3, &(0x7f0000001540)=""/255) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x4) 03:08:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 857.755052] audit: type=1400 audit(1548644887.584:199): avc: denied { create } for pid=22843 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 857.916528] audit: type=1400 audit(1548644887.764:200): avc: denied { write } for pid=22843 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) mincore(&(0x7f0000000000/0x400000)=nil, 0x400000, &(0x7f0000000140)=""/177) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000080)={{r0, r1/1000+30000}, {r2, r3/1000+30000}}, 0x0) 03:08:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 858.470852] audit: type=1400 audit(1548644888.324:201): avc: denied { create } for pid=22843 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 858.571864] audit: type=1400 audit(1548644888.424:202): avc: denied { create } for pid=22860 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 858.574216] audit: type=1400 audit(1548644888.424:203): avc: denied { write } for pid=22860 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x4600, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f0000000100), &(0x7f0000000180)=0x8) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 858.903105] audit: type=1400 audit(1548644888.754:204): avc: denied { read } for pid=22860 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:08 executing program 1: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14, 0x80000) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f00000002c0)=@req={0x28, &(0x7f0000000180)={'vlan0\x00', @ifru_addrs=@can={0x1d, 0x0}}}) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000300)={r1, 0x1, 0x6, @remote}, 0x10) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000100)={'U-', 0xa7}, 0x28, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x255, &(0x7f0000000140)=[{&(0x7f0000000600)="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", 0x170}], 0x0, 0x0, 0x9e, 0x800}, 0x1) r4 = getegid() setgroups(0x5a5, &(0x7f0000000340)=[r4, r4, r4, r4, r4, r4, r4, r4]) write$apparmor_exec(r2, &(0x7f00000003c0)={'stack ', 'cpusetwlan0}]\x00'}, 0x14) sendfile(r3, r2, 0x0, 0x1) [ 859.071477] audit: type=1400 audit(1548644888.924:205): avc: denied { create } for pid=22860 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:09 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) setxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2cf8"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="7a35b0b084919700b2159380210f74c5b33bab9183f6386c739e8957df62d8acfc1fe631d97a1e477589d86fdd6a43064c9bf117f75a10441c3954d8f26e152c9cb1da3161efeced474884360f1fb5ebc7ae14bc1552cc83aecacbd458d7823849e20a1f024c"]) read$FUSE(r0, &(0x7f0000000480), 0xffffffffffffffb5) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl(r0, 0x1, &(0x7f0000001480)="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") 03:08:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x6, 0x0, 0x53, 0x0, 0x1}}, 0x14a) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:09 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0xfffffffffffffffc, 0x80) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x18800, 0x0) timerfd_gettime(r2, &(0x7f00000000c0)) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000280)={{{@in=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000000380)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000003c0)={'team0\x00', r3}) ioctl$EVIOCSMASK(r0, 0x40104593, &(0x7f0000000000)={0x5b6e8bee104186f0, 0x0, 0x0}) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f00000001c0)={0x15, 0xaf, &(0x7f0000000100)="ca2502b90720c068f1ad9102e035837446647fbc5981e132948a733a5117ce389649c272a1cd2cc5b379490d759121768c3a88f8f0176f33b78478bc3f4db5b09128bd07bb0705d895e15b6c6d9f8309ec5fbede569e637e26d2c7938fe76855aa64896a973051dd38a39ffe9e597bd108b650b0efbb115b6cf53f5a3ce650715afda405d813f9ce5438e92c4ecdf6db6818758ab9dd19d88296970f1af85be3bfbde825740b45e832c8f3665fb693"}) 03:08:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="f3"]) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x40) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000180)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:10 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000040)={{0x2, 0x4e23, @multicast1}, {0x307, @broadcast}, 0x4, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'irlan0\x00'}) readlinkat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=""/128, 0x80) ioctl$UI_GET_VERSION(r0, 0x8004552d, &(0x7f0000000180)) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000200)={{0x9d, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x0, 'sh\x00', 0x10, 0x5, 0x3}, {@dev={0xac, 0x14, 0x14, 0x11}, 0x4e21, 0x1, 0x200, 0x9, 0x400}}, 0x44) mount(&(0x7f0000000280)=@sg0='/dev/sg0\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='nfs4\x00', 0x200080, &(0x7f0000000340)='\\mime_typeuser:&md5sumwlan0(vmnet0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000380)={{{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast2}}, &(0x7f0000000480)=0xe8) r2 = geteuid() setreuid(r1, r2) write$selinux_access(r0, &(0x7f00000004c0)={'system_u:object_r:man_t:s0', 0x20, 'unconfined', 0x20, 0x5}, 0x3b) write$P9_RAUTH(r0, &(0x7f0000000500)={0x14, 0x67, 0x2, {0x1, 0x4, 0x1}}, 0x14) io_setup(0x4, &(0x7f0000000540)=0x0) io_submit(r3, 0x4, &(0x7f0000000940)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x7, 0x0, r0, &(0x7f0000000580)="fb4d9d304cfc00afaada0fce1244f90fc5e74050782da5a164b8ddc40ccf66ba0bf4046004d05b90304ba81e", 0x2c, 0x4, 0x0, 0x2, r0}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0xf, 0xdfc, r0, &(0x7f0000000600)="cb4a598e6d567b51d4c69df150e35c179ab54d6a65b36a802ee7440dea5cd0798d23695f30ea0263451d113038dd332ee50d07cc3ceb7998a4d67d2050eebaa485e2bdeb72184dc991e5bc5ef7e777151d4bf8d1b14b36471173281cd8f3249a0c2d343af3e3dc4f34ec34694391bdda82a547699554687d2f04b7f66f8faf68f4b1af965f4d70da149535d20857919032b9959ce3bbe457a172a5ee2e5fd6c7fc9d1fa354f094dfd33512bd211643e5774e5600eb8eb2196ceccd114e6b1688a5849b6dad98a9453dcf4f16", 0xcc, 0xfff, 0x0, 0x1, r0}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x7, 0x7, r0, &(0x7f0000000740)="dd95e2ec2509ca6aa45ca53c0a2d15e6a92b8394b0fd5100d6db3e3693cd7a57037032ee13ca098ad6e54bdab0f8da1cac81f26c30951c0bedc2f5c15b6f75f451965cb6af052e32a6c7f7c365f1be932cb63f0eee85327636bc84763eba5271a728e38787158c6ed3d6a334cbb126fece3577b2f687ee33777219b3887c2980e4e1c4fa7ffe60", 0x87, 0x0, 0x0, 0x0, r0}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x8, r0, &(0x7f0000000840)="1655d76d77333923433c0597ddeee08d8c17a96e3cce52b95eb16a12afe5799d0d20ce798cf6ea46673bb9e10c6ae19f8e492126c243f5b271e83092695a57a8345a3fa3e15971f4ff2308210c8ed6e6a5281d81b31029173ee521ff3480e681b491b923d9c770684ce51edb1b8366d0f45a2e952c88acb453f8f849642c24d627d132e14a4d018585184562e0bf501336192e63423630784903b77404aa83668de670919aec667ef240697aa437de99046b68174b74c17625cf55", 0xbb, 0x4, 0x0, 0x1, r0}]) mknod$loop(&(0x7f0000000980)='./file0\x00', 0x40, 0x1) write$UHID_CREATE2(r0, &(0x7f00000009c0)={0xb, 'syz1\x00', 'syz1\x00', 'syz1\x00', 0xf3, 0x0, 0x847, 0x10000, 0x7f, 0x0, "6e8a263d1174709270ba95f22e6dc39a3701f46d1940f913c3e08f8003b428f8648ec566f5abd7107a2087049acad2d986eba20a14aa3a54096d6fd3397b546f22249e28bb2134918abb17ab73e176a02602f909c09ce609d5022ec94c089458da29631f67195fbdba646ff481b8b08a0f2d9356ae7d52b15d77ca5c503c81f8dbfd31c74c4843b02e81bb3bc52140c50998d042ac7cac6c9f8fe2f746c354685c0483082f96cbcfac8d8c5f9cf2237294a16993a838eaf0fc44edd496d9d6279e0281ccc1852a753282efd167b22ffc6a00f80bb5075717788f1cfad109ee8994e21ae2026307f8eaa15ac835ff5b62add9ae"}, 0x20b) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000c00)={0x0, 0x7fffffff, 0x6, 0x8}) mlockall(0x4) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000c40)) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000c80)={'team0\x00'}) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000d00)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f0000000ec0)={&(0x7f0000000cc0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000000d40)={0x108, r4, 0x404, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@dev={0xac, 0x14, 0x14, 0x2a}}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x9}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7f}, @IPVS_CMD_ATTR_DAEMON={0x58, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7fff}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x67}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x108}, 0x1, 0x0, 0x0, 0x20000000}, 0x20000000) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) setresuid(r1, r1, r2) ppoll(&(0x7f0000000f00)=[{r0, 0x44}, {r0, 0x2022}, {r0, 0x1000}, {r0, 0x8000}, {r0, 0x4}, {r0, 0x400}, {r0}, {r0, 0x8080}], 0x8, &(0x7f0000000f40)={0x77359400}, &(0x7f0000000f80)={0x9}, 0x8) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000fc0)={0x8, 0x7fff}) write$UHID_DESTROY(r0, &(0x7f0000001000), 0x4) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000001040)=0x1e7e) getresgid(&(0x7f0000001080), &(0x7f00000010c0), &(0x7f0000001100)=0x0) write$P9_RSTATu(r0, &(0x7f0000001140)={0x80, 0x7d, 0x2, {{0x0, 0x62, 0xc4b, 0x2, {0x20, 0x0, 0x6}, 0x0, 0xffff, 0x7f, 0x3, 0x0, '', 0x23, '\\mime_typeuser:&md5sumwlan0(vmnet0\x00', 0x7, 'irlan0\x00', 0x5, 'syz1\x00'}, 0x9, '-vboxnet1', r2, r5, r2}}, 0x80) 03:08:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") clone(0x10403ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod$loop(&(0x7f00000004c0)='./file0\x00', 0x6004, 0x1) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='ext3\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:10 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 860.795054] audit: type=1400 audit(1548644890.644:206): avc: denied { create } for pid=22919 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 861.020795] audit: type=1400 audit(1548644890.874:207): avc: denied { write } for pid=22919 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c231f0e5b48bf94bd1bb519d2d600"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:10 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x200000000000, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 861.558516] audit: type=1400 audit(1548644891.414:208): avc: denied { read } for pid=22919 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 861.613269] audit: type=1400 audit(1548644891.464:209): avc: denied { create } for pid=22919 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000180)=""/188, &(0x7f0000000100)=0xbc) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f0000000340)='./file0\x00', &(0x7f00000014c0)=ANY=[]) read$FUSE(r1, &(0x7f0000000480), 0x1000) r2 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f0000000380)={0x2, 0x1, 0x100}) 03:08:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:11 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 861.638717] audit: type=1400 audit(1548644891.494:210): avc: denied { write } for pid=22919 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:12 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0xa0000, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x2, 0x0) linkat(r1, &(0x7f0000000240)='./bus\x00', r2, &(0x7f00000002c0)='./bus\x00', 0x1400) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = creat(&(0x7f0000000040)='./bus\x00', 0x0) truncate(&(0x7f00000000c0)='./bus\x00', 0x1000) getpeername$unix(0xffffffffffffffff, 0x0, 0x0) r5 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000000)='./bus\x00', 0xc200, 0x0) lseek(r4, 0x0, 0x2) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000100)=0x7fff) sendfile(r4, r5, 0x0, 0x40000) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c000000110001010000000020000000e0000001000000010000000000000000000000000000000014000d0000000000000000000000000000000000"], 0x1}, 0x8}, 0x0) setsockopt$inet_mreq(r3, 0x0, 0x23, &(0x7f0000000140)={@broadcast, @empty}, 0x8) 03:08:12 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x726b61af3007baaf, 0x0) getresuid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000380)) fstat(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001500)={{{@in=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@mcast2}}, &(0x7f00000003c0)=0xe8) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x10, &(0x7f0000001600)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}], [{@fowner_gt={'fowner>', r3}}]}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r4}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r4, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r4, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r4, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r4, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:12 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000011fd4)={0x3, 0x4, 0x4, 0x1, 0x0, 0x1}, 0xe) r0 = bpf$MAP_CREATE(0x2, &(0x7f0000000000)={0x3, 0x0, 0x77fffb, 0x0, 0x820000, 0x0}, 0x2c) r1 = open(&(0x7f0000000040)='./file0\x00', 0x4000, 0x2) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0', [{0x20, 'lo\x1aself'}], 0xa, "ec876e3bdf6e0d7286d253419b70ddf51170559d2c745da636d8acdf7966290cea7c84744d7c71217b"}, 0x3c) ioctl$TIOCNXCL(r1, 0x540d) 03:08:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 863.430912] audit: type=1400 audit(1548644893.284:211): avc: denied { map_create } for pid=22987 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:13 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCSSOFTCAR(r0, 0x541b, &(0x7f0000000000)) 03:08:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 863.647168] audit: type=1400 audit(1548644893.494:212): avc: denied { map_read map_write } for pid=22987 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:13 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 863.876479] audit: type=1400 audit(1548644893.724:213): avc: denied { map_create } for pid=22987 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de75828debb4ee1e0cfe51f4f6b1ccd4da2f41de1151226f43c3f0227fd09ab2e074dc560de6ca2967ad8f84c66ff1cc30f1194f729e973af59e078bff84e30bfe491a946e72a6cbf99629f31a8d62b4eb0f40ded77cec3c530950bc91708615ab3c796c4f6bc371c712f25bca3b47008ae0d296a786457f6a52f3b75c9742a756517e627a97f183b47b59ca2e6cd9ab735561c67b1970d690728966aaca07fa6995bc637f7306dd1ce2b30427b68ac4e83bd4cd50dbaf60e5e15", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/access\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(0x0, &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 864.081049] audit: type=1400 audit(1548644893.934:214): avc: denied { map_read map_write } for pid=22987 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:14 executing program 2: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB='o'], 0x0, 0x0, 0x0) mount$fuse(0x20000000, &(0x7f0000000040)='./file0\x00', 0x0, 0x136b7, 0x0) 03:08:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = socket$packet(0x11, 0x3, 0x300) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) r2 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup3(r2, r1, 0x0) 03:08:15 executing program 4: r0 = open(&(0x7f0000001480)='./file0\x00', 0x2, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000001500)='./file0\x00', 0x80000, 0x2) readv(r1, &(0x7f0000002d00)=[{&(0x7f00000018c0)=""/246, 0xf6}, {&(0x7f0000000280)=""/169, 0xa9}, {&(0x7f00000019c0)=""/176, 0xb0}, {&(0x7f0000001a80)=""/2, 0x2}, {&(0x7f0000001ac0)=""/59, 0x3b}, {&(0x7f0000001b00)=""/244, 0xf4}, {&(0x7f0000001c00)=""/83, 0x53}, {&(0x7f0000001c80)=""/84, 0x54}, {&(0x7f0000001d00)=""/4096, 0x1000}], 0x9) mkdirat(r1, &(0x7f00000014c0)='./file0\x00', 0x0) r2 = accept4$unix(0xffffffffffffffff, &(0x7f0000000180), &(0x7f0000000000)=0x6e, 0x80800) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000100)='team_slave_0\x00') r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000001540)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001580)={{{@in6, @in6=@dev}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000001680)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@multicast2, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@mcast2}}, &(0x7f00000017c0)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000001800)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r5}, 0x2c, {'group_id', 0x3d, r4}}) read$FUSE(r3, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r3, &(0x7f0000001840)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x4481}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) r6 = socket(0xb, 0x80000, 0x8) setsockopt$inet6_udp_int(r6, 0x11, 0x6f, &(0x7f00000003c0)=0x7, 0x4) connect(r2, &(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x0, 0x1, 0x2, 0x4, {0xa, 0x4e23, 0x6, @remote, 0x2}}}, 0x80) prctl$PR_SET_KEEPCAPS(0x8, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000200)='/dev/keychord\x00', 0x40, 0x0) read$FUSE(r3, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r3, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@dev, 0x0, 0x2}, 0x20) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000c00)={0x0, 0x0}, 0x10) 03:08:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 03:08:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(0x0, &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:15 executing program 1: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(0x0, r1, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)=0x2000000000000001) 03:08:16 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0xa, 0x0, 0xfffffffffffffffe}, 0xfffffffffffffffd) 03:08:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:16 executing program 1: r0 = socket$packet(0x11, 0x800000000002, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x680ca88309a575df}, 0x4) syz_emit_ethernet(0x1, &(0x7f0000000240)=ANY=[@ANYBLOB="0180c20000000000000000000800451d0013000000000000907800000000ffffffff0000070000289078"], 0x0) 03:08:16 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:17 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="7358a42e692502b25e2d3eb6f0b2d2d2c4b9591f275b526fd22a78656929a6da4de59295dc15356edc3ed8a56e75f45b67033b4f492f43f23e30bc439496e390dc077bfeb32560d85fef5b29f350439445227cfedece8546a696bb19651a686ff9521e910d099e22810145bed99a272478bc3e3095f446bcfaad082404f5d6ce927ecdce0ecb5a666be2d44b0317961ccf0c857ed15451955867766c124203f46aa84d3285a60436b4cef2fae5d112f0"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(0x0, &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:17 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f0000000240)) 03:08:17 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) mkdir(&(0x7f0000000040)='./file0/file1\x00', 0x0) 03:08:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:17 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000024, 0x0) 03:08:18 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f0000000180)=@isdn, &(0x7f0000000080)=0x80) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001840)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001880)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}}}, &(0x7f0000001980)=0xe8) r4 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000001d40)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000001d00)='/dev/fuse\x00', 0xffffffffffffffff}, 0x30) r6 = getuid() lstat(&(0x7f0000001d80)='./file0\x00', &(0x7f0000001dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000001e80)=[{&(0x7f0000000380)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f00000017c0)=[{&(0x7f0000000100)="82beb995add486db81d8d496005c6f5729ebe4c3", 0x14}, {&(0x7f0000001480)="a3bb1264e6cece1f8bfa5ea3218cfdb7acfdee2d031d8d5ad9b3997fd9e1aaa36627174973cc38e46577ba993777b2cb5b93adde1e0c89f420dce50e73f48c56e3fae4c5f0b89794c9ef5f65463c955d5cf27e3c8a574e17770a8a285bfda8c8999e9098a8b3ff84705307ce79039c2b893e0b695f9254537fff276e3a78573de142f5cb9494d40eb1ab777badc4be33679a977063", 0x95}, {&(0x7f0000000200)="151f8b7b09449e16a62d1f02cd724376d9b9e6c8fa251ef860a228bb198e958b2f86fda21b706b552e69", 0x2a}, {&(0x7f0000001540)="89f18c6395a40cd5edb42d667dee1942d1f2b781b0fc74cd85e3", 0x1a}, {&(0x7f0000001580)="a05bd6bf89410e983ddafd435ced99f3d366fc09187a30488b35559b9e24303a9095a21aa9ee445d7c634d7ebcfc28727f3ab2b5c576e734ffe153d3c900e74c39705cf8d399ad6ec8ed596d2e3f34ad2858c95cb9c04fca989a53a7d0e8d92d76c457e081fcc8e67ce04b95636ad201fb4a8a6d2abd302bbc8481d3b5d057eb7dd0b5dc8750095751dd6dbf179a66f242bf02cdb6b1e39e92bebe2cd56fef42972b91bae4c425a9778cd8631f328ac7d58ba7a9ca43ebef841cea23b9199b6bd6e6b992ee636846dcce10a0272ef3ada81db5f3d21bd6c81510bb4b69b2", 0xde}, {&(0x7f0000001680)="2799e813dc32c641160735d8da4e80880eac2427130e64da63e67014d9a522", 0x1f}, {&(0x7f00000016c0)="3718afb22eb92179c35bb102d2ac6f69a11af0adf16c89dd15d979bda6795238515badd298bff848979f928fd988c31a491ee0a2124f76491e90ac52b82a129805f319efd6b24852f7e0d202a2296cbf636713f330a2f8eac3cea94fbf623ff11473cd430e832e48272dab69b1010dc4b44fd825b3ca3fb8982b0626e465e218588cb5b78fcede117f8a61ce451980ee43366004a2d72abf17637ec27d3bb58b3bb21b299e37c93571f731039c20b6", 0xaf}, {&(0x7f0000001780)}], 0x8, &(0x7f00000019c0)=[@rights={0x18, 0x1, 0x1, [r0]}, @rights={0x38, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}], 0x70, 0x4000}, {&(0x7f0000001a40)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001ac0)="a4a47c733d931ec920612dce3daac26517d901de21d479e1ad18f3a994b967affc0e3a1ce56193e0", 0x28}, {&(0x7f0000001b00)="34d03adb68b3eccefc0b77a34c0cd58176471f2564fd4cf62940d26de48abc74caec4b7fce366734b1a3fd002c49a575ac310ba03c46b1689d23255f49098ea316ce43d9cae74c5ee6fa47a4276ea29335a11718bd74945379a61f1897decf73e9b77122b2db8071ae07b57579c2dce3cecd8f3097ed57972bead6041245fb02e5c2388b710659d15e79", 0x8a}, {&(0x7f0000001bc0)="b91777eb1eeb0380e4cf8c0328b817336efc6ebfeecfd69e0e50d70189ea5d3dc559b4bdc0d0dbf7e353ceb30f43491e87665ce1019c56bbeac7663589757d3a9eb2603c53e50ddfae91fd82f2cff4c76dc31ec744a2caabe1be40e84a234cb1b883ca74aa0cba628d46ccaf873f8a6db4c9efbcbea475b218af4cbc3b0dfa7bf4aa0e5075e64211418d3a4f841923c7741fe3e650aa", 0x96}, {&(0x7f0000001c80)}], 0x4, &(0x7f0000001e40)=[@cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x20, 0x20004000}], 0x2, 0x4040) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:18 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x20143042, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0xb3729531c80cfce5) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$cgroup_procs(r0, &(0x7f0000000000), 0x2, 0x0) 03:08:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:18 executing program 1: syz_emit_ethernet(0x42, &(0x7f00000003c0)={@link_local={0x1, 0x80, 0xc2, 0x3a}, @broadcast, [], {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @random="35e0d161e35c", @mcast1, @random="18bdd4329c27", @mcast2}}}}, 0x0) 03:08:18 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x6, 0x0, 0x0, 0x2}, 0x10}}, 0x0) r1 = open(&(0x7f0000000280)='./file0\x00', 0x480, 0x8) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000300)='team\x00') getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000380)={@mcast1, 0x0}, &(0x7f00000003c0)=0x14) recvmmsg(r0, &(0x7f0000003a80)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/62, 0x3e}, {&(0x7f0000000480)=""/64, 0x40}], 0x2}, 0x400000000}, {{&(0x7f0000000500)=@nl, 0x80, &(0x7f0000000640)=[{&(0x7f0000000580)=""/187, 0xbb}], 0x1, &(0x7f0000000680)=""/183, 0xb7}, 0x20}, {{&(0x7f0000000740)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000001b40)=[{&(0x7f00000007c0)=""/149, 0x95}, {&(0x7f0000000880)=""/4096, 0x1000}, {&(0x7f0000001880)=""/97, 0x61}, {&(0x7f0000001900)=""/156, 0x9c}, {&(0x7f00000019c0)=""/126, 0x7e}, {&(0x7f0000001a40)=""/220, 0xdc}], 0x6, &(0x7f0000001bc0)=""/13, 0xd}, 0xbf4}, {{&(0x7f0000001c00)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000001e00)=[{&(0x7f0000001c80)=""/208, 0xd0}, {&(0x7f0000003c80)=""/104, 0x68}], 0x2, &(0x7f0000001e40)=""/112, 0x70}, 0x1000}, {{&(0x7f0000001ec0)=@x25={0x9, @remote}, 0x80, &(0x7f0000003440)=[{&(0x7f0000001f40)=""/69, 0x45}, {&(0x7f0000001fc0)=""/125, 0x7d}, {&(0x7f0000002040)=""/239, 0xef}, {&(0x7f0000002140)=""/185, 0xb9}, {&(0x7f0000002200)=""/198, 0xc6}, {&(0x7f0000002300)=""/82, 0x52}, {&(0x7f0000002380)=""/124, 0x7c}, {&(0x7f0000002400)=""/4096, 0x1000}, {&(0x7f0000003400)=""/14, 0xe}], 0x9, &(0x7f0000003500)=""/5, 0x5}, 0xfffffffffffffffe}, {{&(0x7f0000003540)=@rc, 0x80, &(0x7f00000036c0)=[{&(0x7f00000035c0)=""/6, 0x6}, {&(0x7f0000003600)=""/66, 0x42}, {&(0x7f0000003680)=""/4, 0x4}], 0x3, &(0x7f0000003700)=""/83, 0x53}, 0x1}, {{&(0x7f0000003780)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000003a00)=[{&(0x7f0000003800)=""/245, 0xf5}, {&(0x7f0000003900)=""/195, 0xc3}], 0x2, &(0x7f0000003a40)=""/35, 0x23}, 0xffffffffffff0000}], 0x7, 0x103, &(0x7f0000003c40)) accept$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14) sendmsg$nl_route(r1, &(0x7f0000003d40)={&(0x7f0000001d80)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000003d00)={&(0x7f0000001dc0)=@ipv6_getanyicast={0x14, 0x3e, 0x1, 0x70bd29, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40000) accept$packet(0xffffffffffffff9c, &(0x7f0000003e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000003e40)=0x14) recvmmsg(r0, &(0x7f0000009240)=[{{&(0x7f0000003ec0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000005280)=[{&(0x7f0000003f40)=""/78, 0x4e}, {&(0x7f0000003fc0)=""/4096, 0x1000}, {&(0x7f0000004fc0)=""/230, 0xe6}, {&(0x7f00000050c0)=""/220, 0xdc}, {&(0x7f00000051c0)=""/131, 0x83}], 0x5, &(0x7f0000005300)=""/19, 0x13}, 0x7}, {{&(0x7f0000005340)=@x25={0x9, @remote}, 0x80, &(0x7f00000054c0)=[{&(0x7f00000053c0)=""/48, 0x30}, {&(0x7f0000005400)=""/192, 0xc0}], 0x2, &(0x7f0000005500)=""/105, 0x69}, 0x6}, {{0x0, 0x0, &(0x7f0000005640)=[{&(0x7f0000005580)=""/161, 0xa1}], 0x1, &(0x7f0000005680)=""/73, 0x49}, 0x1ff}, {{&(0x7f0000005700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000007b00)=[{&(0x7f0000005780)=""/154, 0x9a}, {&(0x7f0000005840)=""/4096, 0x1000}, {&(0x7f0000006840)=""/4096, 0x1000}, {&(0x7f0000007840)=""/188, 0xbc}, {&(0x7f0000007900)=""/157, 0x9d}, {&(0x7f00000079c0)=""/103, 0x67}, {&(0x7f0000007a40)=""/153, 0x99}], 0x7, &(0x7f0000007b80)=""/123, 0x7b}, 0x1}, {{&(0x7f0000007c00)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000009140)=[{&(0x7f0000007c80)=""/115, 0x73}, {&(0x7f0000007d00)=""/40, 0x28}, {&(0x7f0000007d40)=""/238, 0xee}, {&(0x7f0000007e40)=""/51, 0x33}, {&(0x7f0000007e80)=""/201, 0xc9}, {&(0x7f0000007f80)=""/253, 0xfd}, {&(0x7f0000008080)=""/99, 0x63}, {&(0x7f0000008100)=""/63, 0x3f}, {&(0x7f0000008140)=""/4096, 0x1000}], 0x9, &(0x7f0000009200)=""/3, 0x3}, 0x1}], 0x5, 0x2022, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f000000c0c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000c100)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000c140)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000c400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f000000c3c0)={&(0x7f000000c180)={0x224, r2, 0x200, 0x70bd26, 0x25dfdbfd, {}, [{{0x8, 0x1, r3}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x80, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8}}}]}}, {{0x8, 0x1, r6}, {0x13c, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x224}, 0x1, 0x0, 0x0, 0x1}, 0x4) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r10, 0x29, 0x32, &(0x7f0000000240)={@ipv4={[], [], @multicast2}, r11}, 0x14) 03:08:19 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYRESHEX, @ANYPTR=&(0x7f0000000140)=ANY=[@ANYRESHEX=0x0]]) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x80000, 0x0) connect$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) read$FUSE(r0, &(0x7f0000001480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:19 executing program 1: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0e000000f9ffbe00e2d2cdeeb7de3b867d525c957e67bf00002d00670d7b066f66b34cd4d2b4b318917917d62e1028535a602159000a3665cd"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x80000001, 0x0, 0x9}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:08:19 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 869.575349] audit: type=1400 audit(1548644899.424:215): avc: denied { create } for pid=23115 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 869.782344] audit: type=1400 audit(1548644899.614:216): avc: denied { write } for pid=23115 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:19 executing program 1: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x8000, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x3, &(0x7f0000000040)=0x13a3, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file0\x00'}, 0x245) write$P9_RLINK(r0, &(0x7f0000000080)={0x7, 0x47, 0x1}, 0x7) socket$inet_tcp(0x2, 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x20100, 0x20) 03:08:20 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 870.271571] audit: type=1400 audit(1548644900.124:217): avc: denied { read } for pid=23115 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 870.342455] audit: type=1400 audit(1548644900.194:218): avc: denied { create } for pid=23115 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 870.344775] audit: type=1400 audit(1548644900.194:219): avc: denied { write } for pid=23115 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:20 executing program 1: clone(0x3102001ff7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x21) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x65}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:08:20 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) clone(0x80002902001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000001080)=""/201, 0xc9}], 0x1) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000080)={0x0, 0x6}) ptrace(0x10, r1) tgkill(r1, r1, 0x12) 03:08:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:21 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) timerfd_gettime(r1, &(0x7f0000000100)) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:22 executing program 4: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x10, r0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40be, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="3b27a4b46ee92b4a59073c369a5e19f9db153c4fdbc76aa2a4bb9f3e5e1aa197a9e97d1016c01813792e50c2692c175aad715d110a892949ccc6e2e54c2d5c8f0b7932b69797f217168b0c1feb128ae34f0daf487a70b5c117acd43725fe17993634f1695dabd7f998cd55e9d5bd911e86aa7a4ad75a574bb9693dd6018b25d942a9544bca1ebb0e8d10c092cdcb85797673972099e4041aaf8d636f66cb1103ef2050ad28fabaed33d6927889d97f4b5ce0de71d3fd832980f4f088d0d824e20549b4bbd906ffa51ce9de54d779eb4de462faac20a3ab0ed9934373ca22cea5454f4c2a740cd461e39956bb5f98df2aebc60cf32623adbffbcc378fa7250b6a3fc863dadcf6d4f8b804bfe70f0796eee6218445dad2811dd6b540ff52efa2f167dd9c1b8b016268d37db430983fefc0645d20614c8df2eb0872c58e09664e672b0b6a9970fec199257e1c606ec3e364c66a0f4d258c74accd43b987c756d602fd8787fed3aa43fd8d84e9656d4a413fa9a423bc54b873583d6d497005e54712fafc71384988d80134fbf84f53fdd74b354848006b8b5b67e7cc5a472475d3ae545ca1fcf7628b873e31ba83a98a7ad5b0cfbe9711b517a9a1388ad0efa2a3b4e22152021d631b731e2e100a9831111db7acce948bb5deeea260463c140ac929e77c58402776caf85d4569a75dde2f64c4491508afb541ed9b2c81fc95c06706235f383e31cf662c95b1e49cfd94871e22720a41535756e419b271276941692bd023dd9ca8bec4f7db1e5c00d8b3be7b8e826a6aadd001edd0dfeb00f8048442b5c48456fd642e629dcb2ff55592665ff491cd832672ce4d999da186db2c3a1f8b6b1f7d3750d7cdb3097954e6e14fb2183ad662c63d4ce8b82dc2487f0fe2ea2827b53a7c6dcced878d2fb29c1d3ff583570e7bc172d1a5c716e0447cb08ce3c468ffdf975da372f3f3eb455aaf5822bc04a51b6cad24a2331369df81c123b009a2381b42e9aeb077f621608d81c12a5f5c6c295d74afd4dd5c051296be0b54c70bf899b347c36bff62f313079983409d7f9cf1242c917985c1b5d0736fe21f8514f63d0369a374c42da40bd5140bc3e602d00c3cb4f8e621863ab47422778d67d72de34753fd72cef80649a1548e4e8dcbcffe4054cc9d8a1f922623a75904cbdaacde768131e587269a4a99d82f7009c1b8ab79aa232a2fd45ad71b60fca627576ba979fa6a87525884b08d721a21400fb1f950b96ead82f408cc4388d3b78fb456616429a520656d5e5a876fd04748498902c86f58d45f4c1b3919eb846a00edf07e7a830bf723e4774f085f15534dd3b5246c0c0970b5ad7bb39b30b156a9430378c5b0aab1261c78d72ac301cd552d5e8dd4b642ec1dc0672745d593bb26d095b5b23576e3cfd6ab580f6e09419d0f0c64250fafaa3759aa1888da48d89c3f7c9454b0b3d0ab40445f5bed4493ef43ab08f31b1345ac4ffd94ad79c9eee53904ed6f572817153190d2e6863f2e39356bb99926419fd314341a536b7e76cae60bf7750a4c29e3f4c7f005530b1d4ee0e25b93b76fcc1108222f0b00de52cf4100e97adfd7b9db1370586ba27e1e183299be00d0df8439c380edf2f79deb441eac59b814b04accdff5e17f02046139f91f0332661676ff506e575f0cb2850bcc9f8666f6d1f69f8f4271cb804a79fccd7016f049d1a494c46a527c437fa0be6d51ec7543d9bd7a2f016194ebe3c99080a6c9b5119863dfe865f8e60cae29f50b67dbfaa0a3c9794d73034485ca1613344c572783db3dfab01b28089c51cda99cefa4c1c881a29e229f04c7e0fd04dc425ae8417852e6e31520c6207e9d4e35285feef2a2cb8a3bceb08a166fa4284a516362621e2c06731a442791f1db063a32cf1f005c914102c7273cb4d7ab1bf567d72f230783d2ea99c43a60e8729132441ee6c5362c33f9b613f84417c3c5549f4e3d9e73c6f83f16c8e57ae22fe5f54515e111fe43ad7c400d214281452bb6141cecad84b23a695f061988d906d03be5d89584634b9e9d9a9b072f8e7cbb47c47719318a2001cafa665dd2c82672d16877ea115bd023fc1975f7c59664bfb06f66a1a5e3f05cb283fb45ea67a2727ee6e10bf35b31fdd03d43ec67b753f6737e0d2f4a5275031595878cefc8f0ca0403b3c6da327afe21720024881def9fa15ec15bb0cb39374f19d63b357936a748e0bb2099ec2a79035bec4a89224cf37c93b534a5348ee94ba3f5f55fa92acaf8e0061598d802fcdc1f7253969a3278154696f42eaf07c89aacdfb016fcb0485a72fc2cdfd7d72f132ff82028a47b61d4dd4d1201d87bd883f74ac1710e05a8fe598dbd94c78adc2ad0e9ae6cb911691b61feaf07539d17c2b05a608dc1f71011c10c92f7faae952e304f0b6c94f754b11e416c4df32f5ca6c0caa6070ee04bfd47adf2f90843fc143b52d2ff50e63ea46a2677baf1df09e67c0768ee6382a8de5dc91eb5552dbd3ba7647b47efc8dc6c9de913710ad2314e3e94a2f9193c5fc3120474261c4914925707530c3a41ec98741aa30fabd70fc38cc57c6707bead0cf24b369f8989b366507b6a261842c727efa97032314f09626954d357374b42fee36fafd448fd0836bea7397b2ac03dff44372e987316fdacf8477befe768dc1505eb58bdb052a5eb3ab1a79014008c8ab55b3ea432beba4434f5199fc6f3b08934cc3fb4cc62b7a733826030153750fa61bbf0dbc1cdfef66ef77aa047c04b9ceb80ff0b99959fdeeaec0e3838dced78e9f12f997bcd992ef36baff4de252999d00406a379272912bab80fbecbd334eb4b844c66c0018312dc20ccb52f36dc84ba4c3876fe9f5b49f39e49e9348f38bcfb4a77a36790971c41c0ed554ebf03c145336e77bca86fcce945c43075d583233b2c36ff471d140ff8b4d91b33ad13540f5f2cffe0ced42839848a13cbc66f1d7393f01a8fe63b37619665d1c98bc1ae09fa9dcc642f2047a555bc8aab2ebfc00b13b902494b139ebe4b96026bf5c441b30b11611371386fac1ccf99df87093bd6609b24f7e7a1bfc175e720c7bb496c45d6f42acfacc216307f7f3bebb96f443e68717442b6ae5a9c29e10a5be02f30007653c9debdaa1e69c28d15d3bfd69232dfafae13622f4cbe9a030ae880375f7415d10770aae1c8271393546f40fa07e6e205de1f52ab215d7c2a1dc474d28e79081913f19c2c53fc8b8d86c699523e836a548c1315610ca4542b0ae145a1fac88d417252fdbec86b4d2d824ca2702102b18062a7194e2f96904dd210c1d2cbd12d253f4243324f61cbb42a0271527d7b871a1ddee9b55030a173ed9573a5cce7924946474c21e39bdddd559aa5f85e981d6ca79e967d5edb484ed6c70bf1d1c57f3ad64b5ede6ba51158d044578d395c561abd382335c5342883d6588d94fb860c0025adab4df23b2c9c00638fe33816b609267ad80e2b6b04d6b7872db753b3ed3dba724bec6c02d5a40cca99e074682f0fc6e0db69a265e5b2757dafd5db7d8a9d5f00b94e6afe662b180b750bedbbb3ba03c52bee15be40b259471fca2fd32696d241d6f9dea3beac4054146e334969e4dae0ef929a4b762bd44612353dbe8275ed21b3f34bf9b38d64e7cfbd8aebf826bd40eb2cb2331b410ca7753c40250954fa8ad12c09e7a54e18a645ad1e501d93e540c6560e702e80e360def60ccab4fd18bc3a33a9ef798aa77ccd30a0175e35b1d6df6963a489322b149d673d920695294f0e6267a4a078c4ab4b2e2cfefb7e81f45f6dd7207e2c8b7e57ac9d988856fa8c0c4c6e49be3c4f9dc7aa078f76268f0be9e2af88a0fe658b243ded33b3836d559a1fb480278f82e546eec2666def860686e9abb898d80f018edb937f7a902238194a16be357e91fd86eaab3c19ae9446a27810dfe586f2d354e251c4afdd89af87421f943d7b9e12b6640897459bd988ef31960784c8072184456fa99d33c3978a0dfc5dd88bfe941da4681d6e31894f5100b2e6fdbd75e51f2f32a0bc00976721b453c5c670b04ca27c23232be7734c35f2898512c3138c78d42626693084826d195299fdb4467db31c79761e40112d1e47d8fe1b846bec1dc7f92d59d088af95a7d4b0d10b7ece85bf6aef12693c429e3df8f7f27289857e16005a233ac1c526afcfa2d4a82ffdd0d52724b3a635e4415d7c0fbcacd1c24294919ad8bd6edc2dcc7e8c66f5980b8483d50a9f5b2204d2f9fbfccffd578dd718b342a1443be5e4f18fbc10691c678ec837ea9a37c8456dde7e3f420bd61e918270b83c3f5c3f9495b33c7be6ea81b78df808cdd55862beb2ad246bf402cbc909", 0xc00) sendfile(r1, r2, 0x0, 0x10000) 03:08:22 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x0, [], [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001]}, 0x45c) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0xfffffffffffffcd9) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000001080)=ANY=[@ANYBLOB]) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(0x0, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:08:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:22 executing program 2: r0 = accept4$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000480), 0x80000) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000640)=@filter={'filter\x00', 0xe, 0x4, 0x348, 0x1f0, 0x0, 0x1f0, 0x1f0, 0x120, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x2b0, 0x4, &(0x7f00000004c0), {[{{@uncond, 0x0, 0xe8, 0x120, 0x0, {}, [@common=@inet=@multiport={0x50, 'multiport\x00', 0x1, {0x1, 0xf, [0x4, 0x4e20, 0x4e23, 0x4e24, 0x4e22, 0x4e22, 0x4e24, 0x4e24, 0x4e24, 0x4e22, 0x4e22, 0x4e20, 0x4e22, 0x4e23, 0x4e23], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1], 0x1}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x4, 0x80}, {0x7, 0xa9f, 0x9}, {0x101, 0x7, 0x80000001}, 0x609, 0x1}}}, {{@uncond, 0x0, 0x98, 0xd0}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x4, 0xbd8f}, {0xd9f, 0x1, 0xc4000}, {0x3, 0xb3a}, 0x0, 0x8}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00', 0x0, {0x5}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3a8) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x18b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsetxattr$security_ima(r2, &(0x7f0000000a00)='security.ima\x00', &(0x7f0000000a40)=@v1={0x2, "4545075a906ed4"}, 0x8, 0x1) r4 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$assume_authority(0x10, r4) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) write(r3, &(0x7f0000000540), 0x0) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x5414, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x8}) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000140), &(0x7f0000000380)=0x4) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000200)) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) recvmsg(r2, &(0x7f00000003c0)={&(0x7f0000000240)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f00000002c0)=[{&(0x7f0000000540)=""/229, 0xe5}], 0x1, &(0x7f0000000300)=""/66, 0x42}, 0x40000103) write$P9_RFLUSH(r2, &(0x7f0000000440)={0x7, 0x6d, 0x1}, 0x7) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000400)={'sit0\x00'}) request_key(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='\xd1?\xf3\xd7v', 0x0) ioctl$EXT4_IOC_RESIZE_FS(r1, 0x40086610, &(0x7f0000000040)=0x230) ioctl$TIOCGLCKTRMIOS(r2, 0x5456, &(0x7f0000001040)) 03:08:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:24 executing program 4: r0 = open(&(0x7f00000000c0)='./file1\x00', 0x4800, 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x8000000000000000) fsetxattr$trusted_overlay_redirect(r0, 0x0, 0x0, 0x0, 0x2) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1b, 0x0, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000080)) listxattr(&(0x7f0000000340)='./file0\x00', 0x0, 0xffffffffffffff7b) ioctl$KDDELIO(r0, 0x4b35, 0xffffffff) syslog(0x9, &(0x7f0000000180)=""/56, 0x38) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000240)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4}}, {{@in6=@local}, 0x0, @in6}}, 0xe8) connect$inet6(r1, &(0x7f0000000100)={0xa, 0xbfffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f00000002c0), 0x4cc, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCNXCL(r0, 0x540d) r2 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = open(0x0, 0x14103e, 0x4000000000000) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f00000001c0)) ioctl$ASHMEM_GET_PIN_STATUS(r3, 0x7709, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) 03:08:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:24 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400000, 0x0) r1 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x10001, 0x250042) sendfile(r0, r1, 0x0, 0x80) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r3, 0x400, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x4, 0x3, @udp='udp:syz1\x00'}}}, ["", "", "", "", "", ""]}, 0x34}, 0x1, 0x0, 0x0, 0xc000}, 0x0) prctl$PR_SET_UNALIGN(0x6, 0x3) r4 = add_key$keyring(&(0x7f0000001280)='keyring\x00', &(0x7f00000012c0)={'syz', 0x0}, 0x0, 0x0, 0x0) add_key(&(0x7f0000000200)='rxrpc_s\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000280)="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", 0x1000, r4) ioctl$sock_inet_SIOCDELRT(r2, 0x890c, &(0x7f0000001340)={0x0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e24, @rand_addr=0x2e}, {0x2, 0x4e21, @multicast2}, 0x203, 0x0, 0x0, 0x0, 0x5, &(0x7f0000001300)='vcan0\x00', 0xff3, 0x200, 0x9}) add_key(&(0x7f00000013c0)='encrypted\x00', &(0x7f0000001400)={'syz', 0x3}, &(0x7f0000001440)="42c6e8e650fa4254d0c0ee80b9f25af944adcf010a884c44041f8dc169e02a88f9abce66a6887bb9fb67f566634df73d871ba950207c4c480f040e2f740113e335715dae96f23021745aa4e2f6de714f9e1a4617adae05cfe7499f8eccf891a5467e38cbf1dc0fca512bbf5dbd971a5643d7eb385df7e22687fa9695f1678aaf15dc57", 0x83, 0x0) fcntl$setpipe(r2, 0x407, 0x5) sysinfo(&(0x7f0000001500)=""/1) accept4$packet(r0, &(0x7f0000001540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001580)=0x14, 0x800) ioctl$EVIOCGBITSW(r2, 0x80404525, &(0x7f00000015c0)=""/139) write$selinux_load(r2, &(0x7f0000001680)={0xf97cff8c, 0x8, 'SE Linux', "61ee3f87461d12bb34c6c2bb5cce93f2bd1d159a7fecd152c8ae78ed28fc66fd9bf3234a1c880fb43eb8968566d884c56f97085492393dccc55526ee8079da6ed8fc2806af512ad61d4b4fd9104537d99351156bd9eb35d8021128118ffe56d0a8bbb59df7a02fe26ff920cf4e46d32ad7152ef2ea94f37d42ca7f0df1cb54d98fab26b28a4fd959e15e189fb3404408b1230c28e73d4da20887aed89c94e8fb2c2e252b098e47a869b2e63062412a69d8e973370588098c7fdf0bbe8c38ccac7a6db66a2f54b9f9e7fb418fb76482a9d73296ac2ac1060355d82e10ea164cda99abeafecd8ddb47e296e7eea00edbb9f32c4b2e3e669d911ab832a72335646172d54c217c20a8271779d1bbf555da998c63ec4a333048847043508d5f84afc8e9a89ef6ec096d8fe67d1e43fb054e532e01a976e940a6d7900616d55188ba29cd13a833692a5a765ff69f0d96b3664a1340cb46c2785e88be0307d2e1296728019516e850200cd01f5bf67e14ff1178c602a21023a441c6129edad1d959795bf36b07df7ac902bf48fd1bcc6da15beb437659abd3af8ec097f0e15a659c279402f477dce8d5be07946380f3866c95f2837972294b974fb188933ae0dc31a8d1f254a26e9ffbef6cd9761c92da3588ed29c7b6c56f3d832efbfadf76001512189c07530a06cfa4fde2c727cd2a312df9889e7bd2476c1ca740743c2d6cd9d9cc9603f69c59fdc35a29340f757f0e6dc25855fcd41c12b6998fa129e7984d98eeb4ae5c4d4b4882e7fe7ca90936346fb080fbda9af06b3bbae6f37e82b6c73ffa19de35b325324fcaaaf2318ff881c946c73cf14c3166f522c5c8f22e08bd23c83953c81163d433924f81be64a0741c2546172f95d52272d47e97491f7b7afcac6bea4dbf993358807ea92340aa5e1fe8f3fcbf9a19b896c7156eeb9b46480f33e86b7c09fdfd86ac0be7c9f29f9c76bbe5185f51c81eaec118bd7410f1dd3d3eae38176aca7b7abeaaa9628926b05c7fe720478c039379323759840e5d2e0e18984f7a40154896658c139992b6451dc43ca82f3b485471ac84919fc461122c5a27adca84608f15855a27a59e6f9742b2b5093bfc256289423934f39bae4cbbe82f0fbf2c28d50c9d94d131e04b1af76f204a5a860f514bd8bf2d8c9320830e095c6af9a728cbb31d51cee11f9091803226650d7419c2c36983dc9a55c55ce23c1b145e6d6dd98e0d9b9684e884e256af2b259dfb41ac58a4d6a00e1ee9503d05cde40e1c9e42b159529cda4425cacd2bae156136ff400be986957e75c86487ecfb9b3029c4732ef6beb47b814fad932273b3b13e815b8644af13b9ab1c07c47750fb01b072d5eecd1c0e3b880f0355034151493a0f0b418c5c847b3ce29f0b4feaef00c2560552c12f5326f2afb819528ef2fb4defa4092e566e6efe2fddd920b9b3851810065b061004842531f605b0d49ad7151baf409d18940782d0176835075878dbf815cf63b956c7cdd03739e4b0e6d52e69ac030897744732f55e32937774556155b34f2e9fe7fab7c44d7c96a7d73c41144473f3918dfb4ef86a5e17351c026671dd1ded9e92521963331e3b9118e87a8024721eaec47d1c351cd10a5e8772e943c49457207fa945525900bd01a87efe87dafd984dd11f910c64c4e70ae4c886684f0bb5dcb82476f692aa4f29ece86190ba96f3bfb0e2843e7275cc753bc41513b5eed5c56e785a20382d0a8f7f91d6d2e4aa6c65652eb6030cb0c1ee8e10e36e688bbf3580c5259a0287fe4caa89197aeccd67301aef6c3bbeec01be0afbf84b7551151520600e9aa598bf3919054e36bfc774c3841576026e34b3e9eb05a190956dea477b1e2e322c964f554fe47c6e724707bd3e6525fbdf4fd1342a26ea770012901c3106fe7713226e3ca6af9db5c760d3bf3fac5bc9f1a8a444715b9cd029c9cd1a362c6ae53b1d1321711928c9fb205722912e01651f1b4e4a514511508cc107efe0a5c9372c8cf155b80e823a8f9c5384ad13c9c860625c28fb50a6ca3af74e662ef0b0238d96ea4d1758e2482cb88e92770dead3d8cfc6638759563a1ec7318a439967679522a1f1133706c26c59c575d48c61aa5d3efaee9d9b3019843efc093faa5380d1375ed64fc5102379511254b4f68e8a22ee839a7cd34e8da9e38b1bab9c3e19cee15fb570497d54d1ba0129cfcb7d165f1de9bb3ac97723248ce483ff0d247958727505322614add222ca6fc2b701cd3e7c813e55113b81c033765ae33014de1432dec42f78168f812f68fe8b2f36dc5134dc22c2bfc0a411ce70d84464dd51cfa17c3f1b87774c10c6e26222b8fc824e70256c994c113e985fdaadea5efe389e03cc351f7faebe5394597b37129b276ac00365ab19643689bd3c3b7e64d81745f70934653c64eb3d2e89db617de81a81a4cc07507ec9c0661a5721e590711df21460df4c01d97aac3d76f60860ce8338a0802964fc7bca56c37a451f1adebaab1b3fa36d9c230a161d8bcd29d1b6b744b941429fd52e5f2e2f2ecb792bec203471176f83dd6308239da23cfe2fdbb18f9b569b7a865c3243a67f6fa129ecb64369ac694d109c5ccd91f249b1b510302a1961041616947c3991584b34e85203553cc82bc86f8b284f28639149506bd3ca16f0e9bf28c38ce09644885f99cadb74116df52810f57f6c8591f5edba674b86838a6844bd180db9fb0e5d8050eb29189ec6745115ba83859f1c18130f59de887038f65b0af7afd0e3b18a823589af4ad9fdaa1548cf2c975d7d7be8d92dc9c0ea3c7b90020c8db40b48c007cc62243895c53d217947c5e0bd3de84fe7f69039415eb1245d51663cb42c569bd197fb0f2af53937e7370a67aa472758e9e23e1c08443af314665e026483babed9f4434e2f07599a811e5b18bdc2a5d863fec5effbd59ec9d91782d05527e5d6659670d3308c6ad38048c88c081c53fb03d34af43e584a057d29209aca9b31f40536e26888efb0c926390ece4be60c41c27275f1d8d745ff16fd340bdb440f2e886a3ab52acc61323d7c9446e1c01354ddb029f85dcca8be9f34190c500891021134bfbefc88bd8e586aea2f846ad015811d29a69add1b858c977bb7fcfa004927ed6e106634686f729978df38e23cbab811dae326fbbf69d5ede0fa0835c1e0c52bfd6b3d2a5803074e1d54976d6a79044eb0945d015f8932b7e025ba6b27464e1f959405767e31d31ba5fb9530646937f901bc1390a1539c1dc1c8a3e6c58b31012836263ca97757ffa48c8b40e537a7f476e81b3657d7644184756fdea8364a80f1d950da21a0a354c4bf474c3045a5e9cf105459f1664e4a9f8b074e3c6dd9be7f6534e2c6e62887403d2698c402aabc7b9baacb8f86f786683dfc165f372ee3a7e609485a22631e21d1ad18433f0a3af9d50cc546e78f70bf3bc651623d4093f493a5c71ab95afb02abfe9aba4713425ed91f009ed323d4a47c87cf9fb9688573666fc5a58b11b4e7a31b8e4450b5fbb784014ff49032fe7a0f23c142d5849486eb511c24d05e5559658cfd227c4711b180f5a56e151c14081862f4eeba642e674e5ad1527444b63d7f42d37e369f2ca706cdfbd1892982eb89ac20b29af2e644dab9bda5ea22c8b51e451ece9fb9fac21372a2ccac83e5b4afd54c48b299cb2c0bad5857d01e2a2242b3572e8f2ddbb9323802fe7ff2099078ec9ee702dda0f8f9068d91d89e58b249d32ea7255018db87aa6ed5da4d868aa4c1e0569df7ee0baba2036611a5539e2500a2efc336f3d3a3bca711333ae5ef77f993eea8d67a0e2a627698c63058fcc858194c65118a8732ecefcc97e27b96cc46308ebf7df5abe7c9d0cac50d31a2f0629311622cdd764c3db4c5bb8846c0c2e82bbcccbbefb0e2506382320dc7455ccf37151f86ae8de4b8f9dac3047861aa6e1d0034b007cfad08b334c78007448d83330a70d88dd4012b7657df0cbf6e397a421ca6240d3d0e3a356b4423a162246ce8da6baccdca6bd678267bd702c2bd5407fe93cab765ff3dcaa5d4fba0394b1d40c54c004a5f8a0c0ce28a88fe4fddadda9d7caec270bea8b633d29a980526a951071ffbde5d0b89a8e02df65f21553099bad827794e02c354e52ddaf11316e4a617fd916dd626e1fadacb532ac80e04a8d8394427cd237dde48b587fea536c329d89392a58b628353dde711cfe303179487262490f0bb14b2d6f41f23b9bc640b33397cf99155b35856c24b756f9f06c2cb3f45d3c47f9498d728daa9186ddb2b6ac706b4c5bca8974a11a2cd030bad317556b27a4132abd2b235be06246044296414770fe1eeaea786579b2483cc5d22ed73f54cf444c7d1016994f3638ac8be93d2a2dc923f5d2fc69d439db185e6aebe5e0032b81b87fa4885d030684ebb778446a57b375ba5abe0c1e903b99c400bfb297b6899ba5c5f812641c57e91b02b113da956c83dba7a3f5d558621b2465bebf90540b916c92f9202f5ab7d6774fe3874d3e98cc1a4900069128ea0e8622d58b1c8bd78847e39caf9f5756c7b6632370515fd5905267c5d3abf187792d4aa2bb6348b9f92ef152c7b40c319b732bebad83eff179b2aea8d237ba9c77a9cbba82a2787a433591a69fc15ea9a6f41f685013318768027a6cc110ec9201200cad4404114de2733405e7b699e965b25fa9786e03aad2d22776995b155d36b90d2e8e10a22f7aabe786c93893e14e65f6e8419506c9831f98d8c8aaf54b64cb5848a4ec153bee3a3df61d36588fa80bdfbce450c8d17711562bd4dfe32dad76bbcac344e7429400eda7360c82d903cd04b7cd3b75069c530b33e8de6b0fff8d4cdd2354be764037325be63feb7ab8d9b20c797c6cfab908ff0aa6905b869d26f7292022b38e9ca8b4964fb0a4cdabe28287959fc2848859161c453f74553195604aee6c885bc02bc594ef8d2c43e20e3dcca27959197283ad04222da61194950ec96e1528d01dbef101767148ebfac21b4b83a97feae862d34e5bc26def89f181a30c929003cf45f705b540fb400e43bd95d66e5cd77627b10286f4a4da2adefac20bb16d1f6c2e0f86c89b86a113776c30b65db9b78aa02153bb708f8dd1ba92badc9ed14ec2dcad0b56634c7c291771f4b9103860f667aeef103a16893a8b2325281bf4ec0c343c8987c5323921f01cfd023442f63d7e795320e854cf9ed5ebdbe7120ab943196321cd2814a3bc7b7679f7411dd26c23339c30100b03c913c5a7fc7ca7feb338ad7767a9a6e062449f3b9377e62948e766b0b4dffc3e81ac92351f4c195e2a4e51287061876d603456741583c91c2777cfcb7a37ef476847cced5cf674ea76057ccd338ce58c98d48896169cbdf4ea56bf07929f6b57722d97a6681f810832cc0f82ddb3292595ed14f2045c782056271bcab1a6c8646d58f679092f185606678a78c68336404d56baa855fba2d6c20ac6d1be73380e4aef21fee33ec7fcfd2c46c1150a1a3681f122f2de0e2649513d396e1c43055d9c25b4c608da6e2ad43a7d8695aa237c3b8a349b933bc6c7ce23aad5d49d1278e23f1e9b1da463bd922505428bb4d9a33595ce3d60eddb8dd8dbe22bccc273796f04c42b661c7cfc1c9a2950d288afb30fa8c0b9f8c55e1f00195482574ad754671e0f52807aca7a3a369e9ccd37b9000b86545f709442b5a125724a06db7176faad1189d8c3fa195359c3b5fb55a298212a543669c9f13de36500136d8f0372b3800da8b8ca2b4a9daefd0ec8375d073a04a53d362a94096148e85"}, 0x1010) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000026c0)=0x1) r5 = syz_open_dev$mice(&(0x7f0000002700)='/dev/input/mice\x00', 0x0, 0x101000) prctl$PR_CAPBSET_DROP(0x18, 0x24) r6 = getegid() setgid(r6) ioctl$SNDRV_TIMER_IOCTL_STATUS(r2, 0x80605414, &(0x7f0000002740)=""/6) r7 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000002780)='/selinux/create\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x6) ioctl$UI_BEGIN_FF_ERASE(r5, 0xc00c55ca, &(0x7f00000027c0)={0x3, 0x3ff, 0x5}) execve(&(0x7f0000002800)='./file0\x00', &(0x7f0000002980)=[&(0x7f0000002840)='keyring\x00', &(0x7f0000002880)='keyring\x00', &(0x7f00000028c0)='TIPC\x00', &(0x7f0000002900)='\x00', &(0x7f0000002940)='\x00'], &(0x7f0000002a00)=[&(0x7f00000029c0)='/dev/input/mice\x00']) write$evdev(r5, &(0x7f0000002a40)=[{{0x0, 0x2710}, 0x17, 0xa6d7, 0x6}, {{0x77359400}, 0x0, 0xff, 0x8}], 0x30) epoll_ctl$EPOLL_CTL_DEL(r5, 0x2, r7) ioctl$FS_IOC_FSGETXATTR(r7, 0x801c581f, &(0x7f0000002a80)={0x1ff, 0x401, 0x3b99, 0x6, 0x8}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000002ac0)) 03:08:24 executing program 1: socketpair$unix(0x1, 0xfffffffffffffff5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000600)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@dev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000740)=0xe8) getresgid(&(0x7f0000000780), &(0x7f00000007c0)=0x0, &(0x7f0000000800)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000840)={0x0}, &(0x7f0000000880)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000008c0)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000009c0)=0xe8) getresgid(&(0x7f0000000a00), &(0x7f0000000a40), &(0x7f0000000c00)=0x0) r8 = fcntl$getown(r1, 0x9) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000c40)={{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000d40)=0xe8) getgroups(0x2, &(0x7f0000000d80)=[0x0, 0xffffffffffffffff]) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000dc0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000e00)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000000f00)=0xe8) r13 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000010c0)={0x0, 0xffffffffffffff9c, 0x0, 0x15b, &(0x7f0000000f40)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7'}, 0x30) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001100)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000001200)=0xe8) r16 = getegid() r17 = getpid() stat(&(0x7f0000005140)='./file0\x00', &(0x7f0000005180)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005780)={0x0, 0x0, 0x0}, &(0x7f00000054c0)=0x11d) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000005280)=0x0) r21 = getuid() r22 = getegid() ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000052c0)=0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000005300)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000005400)=0xe8) fstat(r0, &(0x7f0000005440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000005540)=[{&(0x7f0000000300)=@abs={0x1, 0x0, 0x4}, 0x6e, &(0x7f00000005c0)=[{&(0x7f0000000380)="93aea771f5bbf0a933ebf6b811a578759296dcd2a6f0c2e5a324cdd406586171f39eab663a4f83ca9083b90c297829c12216b4486c270b9fd6c98432fc8ba18c1d892839ca71f892c872a019c8f28d0e7c84b1c1adea9a80be9517fc4004d6eca1a074da17cfe5e360aceac66dfbfaa88ecb2e26cd2a8e9781a29132a05aff8eb2cd988436126d4b8b62db9162bd5df1b9594408b06445de5342e8603588c7401103aea13e83527b7b0dbe859236dbaf28f878eccd61143677aca8b48cad2b873cc8089210ac71fc06e32889af72619ba8f149421e283e738563e2f06a573a491db9ce74e28d1e1aa997d798f52c", 0xee}, {&(0x7f0000000480)="7c9ded8ee716ab5635185eac5898a2943b0ff26129412b7de8ab746f78879bd55094df75e65b0e0856561cb2ebbe51494b2d0e8fd0b92ccc1ad2455a16f83689e9ab54a41cdd6f510b2d58529c86da4082e47e4f43fec8467e5b3c79ba3fe61bee830af307d4ef0932281a6114e8de5a5912784c5e", 0x75}, {&(0x7f0000000500)="8c65eeebf7fc45986b573520f4", 0xd}, {&(0x7f0000000540)="7bb056457f4212a0fa9932db3453317f278622baa5d4191cf70de389a551c20255067fa89a1175f264a91e10dea618a76ff6299181505d71680d68186ff24e2ce62cad5de9893ba8e52bb72b", 0x4c}], 0x4, &(0x7f0000001240)=[@rights={0x20, 0x1, 0x1, [r1, r0, r1]}, @rights={0x18, 0x1, 0x1, [r1, r1]}, @cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}, @cred={0x20, 0x1, 0x2, r8, r9, r10}, @cred={0x20, 0x1, 0x2, r11, r12, r13}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0xd8, 0x4008880}, {&(0x7f0000001340)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003600)=[{&(0x7f00000013c0)="265708aa5e64aebe6b372e676ef2fde6422537fe5353fb16ad99a958921706d70bf9e1ba75d03954494ce8defb9ddc02aa31628b66673fbf65427f9080b33a546d721ef3128a056ce1f8a0d3968ce5439b52e9dae0bcb928ef869702e2ad3fc601143b57248b90938b2079f44239b788e311db24a30d2f4291df694e58dccb4429b1389ddd9842871b904a3c2c76f172aff7d0df44369d8824983afff9773d66d039acbc", 0xa4}, {&(0x7f0000001480)="bfc4ce4fd5235958f4e13692fb8a01befb335e858a847e2429a3d45e21f2b95e321c9d257f2ad3c6a245ba88223a103b2c20bc823f82f2d98f9876ad62120f798c", 0x41}, {&(0x7f0000001500)="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", 0x1000}, {&(0x7f0000002500)}, {&(0x7f0000002540)="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", 0x1000}, {&(0x7f0000003540)="ee526f5dea9f2c79da1bd03125bfb5ab7b86d9a570702a67b661c39d2ec2f42bb4f94a78db84217511f533129bb849326979fc122e2402f3127e495930ed23108a8cb3944ba5450475c9d04370ea5e84318f13dee0b53b2562fcce7d58dd0f899ccfc36b02eb38d2ba87b7b76b812e8422a3cface847223ab5d11fd13f33994ea47ca3f1001c96cb52f3f09af4c1877b0b7332739944ab9442c0852bc16dff4619aa8f", 0xa3}], 0x6, 0x0, 0x0, 0x10}, {&(0x7f0000003680)=@abs={0x1, 0x0, 0x3f}, 0x6e, &(0x7f0000003880)=[{&(0x7f0000003700)="bfaa8cdb3e8d77446da5e280dba0e15bec0b5328f2e5df5e61009a2d3dd6e5cc1e442487314cb5bd3071091ba833eef108e77fb084e962c14b3d315a", 0x3c}, {&(0x7f0000003740)="c92ac44b653d6f5a6c04ea64273d7e59aa1fd8d1a15f02fa4454b5aec2b92811ba214976cbca85656958815f8333e1a52fb6", 0x32}, {&(0x7f0000003780)="4f957207cae925dcdcf54429a7ca72ba7ceef268024b21c94c3aea713c29f3d6edf024b5c2d817032bf7fbdf6221533a0fe70c61b70fc3042742c5a072d1c4e143b2fed5cca846c10f60bb27246978d384d17fafd9971d9c13f06882fc4151685316ba85157d9100bc2db7c75e142a01edd2fbcd88f1a14a037c118ce7d6", 0x7e}, {&(0x7f0000003800)="9a0073e1c5a7643526aa9af78763982059a16891681d6ad0dc404daea503d94b14dd88307348f753cd903aeb4798974c059d37e6681211bb54f15739de592e9766ef6372b3da9c7e3174b2", 0x4b}], 0x4, 0x0, 0x0, 0x20008800}, {&(0x7f00000038c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000003e00)=[{&(0x7f0000003940)="3da528c00cc52572c7c67ba1ad38e7e53e3c898e6cd998ff5090409b9c7a1ccd86bea1916519cff563c6fe6ab68a21be813831c80f9fd7f87d0f785039ce25a36045b13849634e5a13d3cde1295d4d0e54ef51f21ffc28219e17cdcfc0e88c7dd2e2767a66ebe0f46366fc78da8d2ada59ee1e58b7437356df6d9be24c81e3add4db8a2f1a5d4999701f51dcf507aa062a5a8207c98d7128b2bc995b9101b1db82c3160446d2f96a6af75fe01b0f05025e199762ebecde161c250b853bf00689b0b4a2d23cefad80", 0xc8}, {&(0x7f0000003a40)="a755ee06dda5c73f9aea436885fb72c3a30a7e78367b91fd54d1407fb3c5392573d8275f52e47d313db3340d565358034145370532d12419f7439948882a500f659e0828056e1f250361ee21127d1bee6e868d9648e6d86ac76552a6b643751772e751374c3f8fda4ac5540bd7dce2768354194b6dfcb2936ec0416802bcc875b5c0933b298dc56defb7a20d6d32e5742de423a2a1c402b10b1a31b64a6a15e297542651e5fe3266aa5b0b1a97c5f4e54b0d4d94f4c37fcbfb4dfc6c1a21512818d13ee9e6f9f5a4d76a04ce86c263f63ecc19bc6dde425eadfec56cd34a06f6a8439d6268eb46c83e470c726c3b2ed8a3921a", 0xf3}, {&(0x7f0000003b40)="a5dba7c2a713027f94f99056bb9fdf20cd50b6c2a472aac1d2b047bd10741b5b37c7fbc7a20bc6992674b075064c00271cdc00d0e3cd678a0885710dd89a40178be166645dcf05ddb6f0249be7a0969aee8fead484e6f62e2d2a5a7a7b915979b61678d0f1290d5915b23a7324c47db1f8e9251b56a9e0959ca3afd9d6b5aa00192c587b3906ce3e550a7e6ce3dde99a810b827b89c22c36e4d9069a575c79cfb5857ab5dd14d533ae8622", 0xab}, {&(0x7f0000003c00)="e0de4d911ee5b23007", 0x9}, {&(0x7f0000003c40)="7f1171f3d8a3a0c3ccc42b017e5dc35f9cd52f0c162df548da9a25f4e92a9aa261e7f6e2492bab2eed3ab85fe15990441f9c1a28105c30347eaa26e70beb17d5b790d01a354b62c02f2a2700d5d337a6b330bdf43ec1c9fd93ea36fef3701b7745113a6973baabfd6a130c3de2ca12aea54e68179e76dd3e918838cabd82328106b126e2cec43e2123d3ca4d375ee9e9a08112dbf95aafeecd534274eb2ae93c2c14a171514a3dc1cbda8104663e22d5", 0xb0}, {&(0x7f0000003d00)="593620b85001bc387625801cb8bdb9ec5b400eae4cbb669a0a6e19bb107bd6382899273156df8d89905a26429750b57215af0eb4794f1bc411ed7d454a770ec25dca98f4b9e769d6ef91f1221c0daffb14efb94915f6708c69747cf11d97d149be32677deb8820cf02dd60d446b3b5219c08c9c164081c0227b0b2a05062f522", 0x80}, {&(0x7f0000003d80)="999ae58f482592c7cdbd29433ebb", 0xe}, {&(0x7f0000003dc0)="3c4faf61705120cdaf2adde2b519", 0xe}], 0x8, &(0x7f0000003e80)=[@rights={0x38, 0x1, 0x1, [r1, r1, r1, r1, r0, r0, r0, r1, r1, r1]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}], 0x58, 0x1}, {&(0x7f0000003f00)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000005100)=[{&(0x7f0000003f80)="f50c15c379dbc4a4148fcd148d7d682f45368966378c7cba66e5869e3657b1746745f47f237a93e7b480921f9bf383704d2bc538ee699390bd9cb56de8b318a3c7ff104bf5cd2ec405ec835cebaf1d9e340194779e2c1d", 0x57}, {&(0x7f0000004000)="40250898bb3d5c8e6e11166633375608b09e9d9e4dd302bb401ba7a0c4f3a01bd681af6c8ad892e449a7a45d90317479c5e7a36e304d1a6cfe111fa0f66d86f3be4b94d667c1279d41336b52b397930b3789d443df92de2e5d958ca6eaba529cef2694144fc3a41e59404ef022f54c1e9a3aa42c2202df684a", 0x79}, {&(0x7f0000004080)="c09bd0ba59ba2b7ed0473bc21d88285458e40ddbe0ad06665e6f83407bbae7fa1a3f66444c0d974bbd1fcec4ec908be0ed95e71a3326155336633e00f72c99316b94bf4adb30d5bca78f2f1b09", 0x4d}, {&(0x7f0000004100)="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", 0x1000}], 0x4, &(0x7f0000005680)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="20000000000000000100000002000000", @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25, @ANYBLOB="a9f44499c4944fe8be8d57827082011d1c9e8210e317268a3af849baab6c7be616b02c46a66ce69cf73874d31bbba9b3e6bb4bea1b8dccc7fafda76d353499d5bb572cd6e59435b99d783ac12ec7ff369769821fd8d36dbdf13d9dc1c0a2f5b72f5c5c5133"], 0x78}], 0x5, 0x10) r26 = socket(0x10, 0x3, 0xa) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="1701ab500180000000000000000000000000030ae2e932468a0a2f6be6ccfc99a9e0877f73bcd1706b150e8510fb5f351ceb24a74bdc5a971382b38d50c05d8a8f3d570e739ecb5eb36a0ea557ddbcc51ec145dd0bee8a484c784cbb535f11417b7ff42c849722cf9ce5306e7852f2ca"], 0xe) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x0, &(0x7f0000000000)='./file0\x00', r27, &(0x7f0000000180)="9918ac1c5430194d69e55e3797d35b350a4f0ef4be4c2d4074c7595c28811d10782be306af7aca121f08022c38bdc4217b4dbdf7aa815b5aa010a38a55ec923ef40f7ae1376ec29d999b05e8e05b9bb296a6f178671bd37df4c5ad65a7e58fd8f779825e0256893db59f24f2a860604b36bc3d48be2c389f710c7f72b14f5b4f542a547a178173ed6abbcdc311578b830f9696f90c78aece9f6e2504f0a5423c8898db47ceced8dfed679b438c9deba5db9d1db595e95f12b64772e8d813b6ae1ecf416aa4210a6e4d4e20acb896e08a2108dc84") r28 = syz_open_procfs(0x0, &(0x7f0000000a80)='/exe\x00\x00\x00\xd4\x00\x04*\x00K\xdd\xd9\xde\x91\xbe\x10\xee\xbf\x00\xf5\xe9J\xae\"\xe8\x9b\xb3l\xc7Ez\xcc\xc32\fg\xa9\x0fy\x80XC\xe9\x01\xd2\xdau\xaf\x1f\x00\x00\x00\x00\x00\x00\x00\x00E\xccaX\xf01R\x88D \x9c~\xd0[\x16\x0e\xf36r\x1b\xf8\x96\x86\xffG/q\xdf\xcaSS\xf62=\xdf\x80\x06\xff\xc1\x05-j\x80\x98Z\xdch\x01ped\x8b5\xc7\xd3!\xfc\\\x04f\x06/\xbf\xadZ\xcb\xe7\xffl\xef\xe5<\x88\xc0Z\xb9p\xce\xeb\xdf\xa5\x89\t\x8a\xd4\r\b\r\xeb$\x88\xf9\xe4\x06\x96\x82\xb1D\x83\xf1\x13\xcbiy\xb2\xf3\x90\x17\x9a\x18\xe2k@\x93\a\xf3\x1e\xd0J\nh\x1f\x00.\x00t6\x94tu\xab\a7\x11\xc9\x8a\xe3\xb4%\x9f\x1a\x1a\xff\x9b\t\xaaf\xcb\x90\xcaC\xa1\xdb\xc6\xde\x15\xab\xb4\xaes\x9f\x9e\x8f\x04|\xd2\x9e\xc7k\x9e\xf6\xbe\xb7\x83\x9f\x80q\xaa\xeaM$~j\x95\x14t\x8c\x93\xd0\xbb\x01\xa7\xc3|\xa6\xc8V2z\xf8\x1f)m,,\a\xc2\xd6;\x87\xd9^=\'l\xa6\xd6\bU\x7f\xd6\x9b\x9f\x8b0\xabN\xeaEW\x18\x1c\x0er\xd9\x80J\xc6h\xac95\xd8\xa9\x84_}\xe5\x8c\xee\x0e\x91\x8d\x90\xf6Y\xc8\xf6l0;\xf7\xbc\xc2\xb85\x84\a\a\xee\ns%\x7f\x17\xd9{i\xa1?XE?\xeeA)\xe7') setsockopt$sock_attach_bpf(r28, 0x1, 0x32, &(0x7f0000000040)=r28, 0x4) sendfile(r26, r28, 0x0, 0x100000001) [ 874.611164] audit: type=1400 audit(1548644904.464:220): avc: denied { create } for pid=23221 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 874.612847] audit: type=1400 audit(1548644904.464:221): avc: denied { syslog } for pid=23218 comm="syz-executor4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 875.007719] audit: type=1400 audit(1548644904.854:222): avc: denied { create } for pid=23228 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 03:08:25 executing program 1: r0 = socket(0x10, 0x803, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000080)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000000)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@mcast1, 0x62, r1}) write(r0, &(0x7f0000000040)="220000002100070700be0000090007010a00001e00000000ff000420050011802644", 0x22) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x0, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000200)) [ 875.113434] audit: type=1400 audit(1548644904.964:223): avc: denied { create } for pid=23228 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_fib_lookup_socket permissive=1 [ 875.383161] audit: type=1400 audit(1548644905.234:224): avc: denied { syslog } for pid=23218 comm="syz-executor4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:08:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 875.393854] audit: type=1400 audit(1548644905.244:225): avc: denied { create } for pid=23221 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:25 executing program 4: r0 = dup(0xffffffffffffffff) r1 = inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x10) inotify_rm_watch(r0, r1) setrlimit(0x40000000000008, &(0x7f0000000000)) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock2(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0) 03:08:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 875.396216] audit: type=1400 audit(1548644905.244:226): avc: denied { write } for pid=23221 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:25 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) mmap(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x1000002, 0x2000200000000010, r0, 0x0) 03:08:26 executing program 2: r0 = gettid() ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, &(0x7f0000000040)=r0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080), 0xdf, 0x0, 0xffffffffffffff5b}, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) r2 = socket$inet(0x10, 0x2000000000000003, 0x0) ioctl$sock_ifreq(r2, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00\x00\xfe\xff\x00r\xed\x02\x00', @ifru_flags=0x2}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000080)={0x1, 0x3, 0x10000, 0x0, 0x6}) ioctl$sock_ifreq(r2, 0x89a2, &(0x7f0000000000)={'syzkaller1\x00', @ifru_hwaddr=@remote}) 03:08:26 executing program 1: r0 = syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000012000)={0x15f, 0x0, &(0x7f0000005fd4), 0x0, 0x0, &(0x7f0000012fc7)}) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@md5={0x1, "e056a334cec89e14c143c94a52f45942"}, 0x11, 0x1) 03:08:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:26 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='net/ip6_tables_targets\x00') 03:08:27 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:27 executing program 1: syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000440)='pagemap\x00') sendfile(r0, r1, 0x0, 0x8000) 03:08:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:27 executing program 4: bpf$MAP_CREATE(0x0, 0x0, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getpid() r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/enforce\x00', 0x101000, 0x0) getsockopt$inet_buf(r0, 0x0, 0x2e, &(0x7f00000004c0)=""/206, &(0x7f00000002c0)=0xce) setsockopt$inet_MCAST_MSFILTER(0xffffffffffffffff, 0x0, 0x30, &(0x7f0000000a00)={0x800000000, {{0x2, 0x4e1d, @empty}}, 0x1, 0x7, [{{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2b}}}, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e23, @empty}}, {{0x2, 0x3ff, @rand_addr=0x1}}, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}}]}, 0x410) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x0, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x48) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x184, 0x100082) pwritev(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0) write$selinux_attr(r0, &(0x7f0000000240)='system_u:object_r:clock_device_t:s0\x00', 0x24) getrlimit(0x400000000000, &(0x7f0000000300)) setsockopt$inet6_MRT6_ADD_MIF(0xffffffffffffffff, 0x29, 0xca, &(0x7f00000000c0)={0xfffffffffffffe01, 0x1, 0x4, 0x74, 0x3ff}, 0xc) tee(0xffffffffffffffff, r1, 0x0, 0x0) r2 = socket$inet6(0xa, 0x803, 0x6) getsockname$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000340)) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @link_local={0x12, 0x80, 0xc2, 0x0, 0xe000000}, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x6, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x40, 0x0) write$P9_RVERSION(r3, 0x0, 0x4f3) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:08:27 executing program 2: r0 = socket$inet6(0xa, 0x7, 0x2000000000000) sendmmsg(r0, &(0x7f0000003780)=[{{&(0x7f00000001c0)=@nfc={0x27, 0x0, 0x1, 0x7}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000240)="4b4158a6e076385b94074353455ea83d8966ad29011eeab9210d516f2e7857bb789a4801c9c603dc52e9c1117b06cc039e9f28045cc49ef4fd7c5b64d61242975571810b48179e840c0408cbae80ac62e8282fb2ec", 0x55}], 0x1, &(0x7f00000002c0)=[{0xe8, 0x88, 0x1ff, "9781ca083b0b31b516fbfbb4d486173d2b7aff2a4a848080001e8eec6b5beb920b70a32f53e5ef0f555fb53bc4909df1d407235cf3c33c81ba2bb567e899f72b1ae4ff79bf26576b8b77b63f550a77add369dad5aaee82c0f7cf301d12480164ee0dfba68c743ad35b661e44e3b196e83b365a32b4cc96639c7d77d733f8797d8f5517b3d5f973903f5351bb1101846f2adb2d5ff794e3749e454e7f5c4b622475c1869751fca3e9246376a9f06bd7a6f49d6a6850006c79bde1405f66b0ec991f803142e4414a04c53b177ec0c56c330895a3bde1"}], 0xe8}, 0x1ff}, {{&(0x7f00000003c0)=@isdn={0x22, 0xfffffffffffffffc, 0x36a4, 0x0, 0x4}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000440)}], 0x1, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x1e0}, 0x100000000}, {{&(0x7f00000006c0)=@nl=@proc={0x10, 0x0, 0x25dfdbfb, 0x400}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000740)="0105a4d8d2150268ff0ec8be001cd3a46560d44f5309cdd32d3154581371c14d129b56c17a227652b08bffd1cdca5d0e65d5c9d360fc20171f172b1c9d2cf0dfcb4c9fc21dc05d5fddb20840eeb4138cd6f878569c835da17b477129792a8f5d8e4a356d7f0187020c506581be78996d333279c0116a7283d823ab371f0e05ef4e5e0219318920daee38ffc87053779da9699b9e0624b4cd6451f6dd1a80c90fd76909151132ba8e70949d73379a43abc0b131292295816ed47360ac348b58200a6dc7a396954d0e0a6fae9c72", 0xcd}, {&(0x7f0000000840)}, {&(0x7f0000000880)="ac9fa060ed0bdf20464cbf758418bdefabb0baf23f0be5ef948dd22f7555755849a6e2d1234ae4734d", 0x29}, {&(0x7f00000008c0)="84ec650413ca5595e1b46b02cd712ff34a95af83da885456db8ee66e46a0aaf176ef448e41", 0x25}], 0x4, &(0x7f0000000940)=[{0xf8, 0x118, 0x4, "7e3196de30941e180f886119de70fb08876788138a4f1742175fdc9e21cfb07eab70253b46f76a5473c6b8b18453c622a4144afeb545d46295dcc5007628f7db34f378f5bf5bf18c6a8b228df5a87af88d16269e3a35ec1f46a5c06bae42f8102fa9cbd6dd70e6a1a04ae668d737ef58974040b1c89f0a5782abca632c01c135c92b3b7f33054c9828d395eb3eb2b5d64b48f8c1ce59d963ed9cb4d9ec422786d8c50c1e45c91092c5d16ad6618d9ddd19b81369877ebf14c982d5721ea80f11b7af020ce46a677b8c2ffcd41aab4c306d4ae3b532ac8d8917bb142f2525ee55dd16f7d009a11c"}], 0xf8}, 0x1}, {{&(0x7f0000000a40)=@sco={0x1f, {0x20, 0x8ec, 0xffffffffffff471d, 0xa4f, 0x0, 0x5}}, 0x80, &(0x7f0000000bc0)=[{&(0x7f0000000ac0)="ecad6ebf6d93d2434eecf32a7a69be49536da68a9db2845048f751496069633c85b8ce58f72c8379649e0883190194e935d871377609778ab4f31836ada117695df05752b7e0ce57ea879a5a4c0b3672c25e979f21c35dce6be8963acfc353a98bd51deac4c5501096dc342641869ef4d5438d", 0x73}, {&(0x7f0000000b40)="80fe99ba80ba0758e98e555364d720e808c4080a2b41ddb18699d4d4e8f23275e4dbde3ea765a4fecbc499db2ad92a4747b4571a8d3b4b2466c05ff0f3e7b7e67ac1c4133e9ef9d71029a2346e5e56", 0x4f}], 0x2}, 0x6}, {{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000c00)="6749bb7e45f9c2a4ba8d6556af26c0f537eb7d358b32670b72e43b6751fb5bd574dab49172f8fabe25298119c6adb400aeefc79a260bfc97150abc3b26e70c29c0299f94435af8d7571941890c2fd4c117c49c9ad43361082ad14ca725ef4fd1822663bfcee77011baf82fbf05a6743007da41861ef43b0d", 0x78}, {&(0x7f0000000c80)="364ebd2979833b60535a3e48566b75d6b29d646a1210e32e481dcd34820ab2e0008f438a0c5a1028e30c68da9b0f4c220988d76364f44b6c84989242f8f35815714771e40b1b4afbdfd0aeff2f62423f1860235747048316e103621fafb2bcae8d074549b12d71131931c287876520ba9792cdcf30238cf1b41c8012b540f8188a3721aba614e1", 0x87}, {&(0x7f0000000d40)="a154da604260241708ffb251548ce2051ebfcfc2ff5776e875f72bcc99781b12a4ea7a75fa62fb7c1b7e31479283c4a22aa8fdca", 0x34}, {&(0x7f0000000d80)="9553ddb1d4c99a13ca9456df4c47b74ac53da32059e64e8ee92071efa760ba5eda53c94d0cbd3325a3b6f9a7a332353c23da1dddc69e1343fd9d61e9d9e17fd18f17c0d525728bf70d5dc09fe7d2e7255d04301626f1facde62d8196435f9f511b5caebd7fb76eccfba11d7c7a5bfb4069f27f0fc52968200f8fe23e3917cf3b0b1cc0983c6582e38e0f1df7ec0c8ec3135edb41fb739cb2bf9e05eab6fd9d8c23979619a69c2237a460318b9848f77e515beed5864a5bd7df82d31e639a46fb1e30c1a574b0484f049c7fab70c1b220e320b000f979b8060c3c665ce58c833dd69ea2d4863a46be", 0xe8}, {&(0x7f0000000e80)="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", 0xfa}, {&(0x7f0000000f80)="b40c6bc99f25a4e4612de6a6579d1b49217799ac5abcf86c41be6568021a10a366eae0be62509ac87bef13fe6912ee96bcbdd22c652994dfae6b4b9161cc675c937487940b45ba12dbac75075ff5f669b2467a872ad4839fe07cc6149ab1a6056342853766edda17a3b6b0f6233b3fd1b0e3f52690a6428f9a5cf6eb395f01d74659e8401d62eed2", 0x88}, {&(0x7f0000001040)="87d78e546f5e99ceac3869e3c2ff4a3e2a82b641f5f9fa044d7b830226fa4d968aa0496be6d4696a7a7eb73a67eca255733bfe76f8ff98680459c399a0e1b153fe50782aad25719e39d0ffdecc969f4c2a5e6ba2dfe223555d9738bab37841eb2c724dcf3ef822f857fa3ac1afec941ad11b73c4c3efff3e827f934946586d09283fe7a71727baf622c7", 0x8a}], 0x7, &(0x7f0000001180)=[{0x18, 0x6, 0x63, "32f5"}], 0x18}}, {{&(0x7f00000011c0)=@isdn={0x22, 0x3, 0x3, 0x4, 0x1000}, 0x80, &(0x7f0000002300)=[{&(0x7f0000001240)="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", 0x1000}, {&(0x7f0000002240)="76f610cd317b79ae240279e9aae31741af7d2224ce7dff3447822e6a35a08c1337d1836e9a405356fce046161bcb149ed10ac778be44d49794aa92fd47090e02908d5785a70dcc342e1c2fd298111a94f52f3c8773d3f74fa78f69ca7c4ed631031fc441abf586ed9c5a71404be7512a354c33624173950fc4d06557e6e5d3c4c30af2ce152aaa40b1c646bfd7022f52eaea6128f22ebaafe45bd5cbe59741", 0x9f}], 0x2, &(0x7f0000002340)=[{0x78, 0x105, 0x8, "89bce1691c52d27e09007f7ae199d03294edfec8880320872634a96218e432c8e54eb586f81e3ec57b4b29664eba5386c4f1c672b266db125b2cc97c2524dda52beff0ce0600689f44b1de27a1454fe511fd1b7e7b9645dd220716b87f0ec7b0d7cfdcbc17ecdf"}, {0xe8, 0x114, 0xfffffffffffffffc, "21b7afdbc69d35510b68d72745fb3679743c4b1b9b6deab7552b46d9bad2c3e47021e38c023e959ac8c1ba001fe49d8321e85a4d2c5bd5381bfb2a437fef756adb294857a0b25bbbe18f468e4d7a265969351a9182ce07dc77005f3739aee2d2a20c9850ab6f6f096f20746a1306d2ffed4939eaf4ef67a84668be99ce315caffb8aa76925e470039ea0517c4e0825c520a28eb46fefe62006bedc59795814d2c0189bd53d597a535005c7ba5566014995c6099180185f66ab9957fb6d1fd9613596a88f544563486fd7671f9bdcb0d8d8ad9a1b"}, {0x1010, 0x119, 0x4df, "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"}, {0x68, 0x13f, 0x4, "237b87f63cce56357b3d15686d03659b3fe106783069ce4154ed9d629b78f8f575d6f60614e5879e76995224f53057576c636466c3e0c9c7e87158c832a1d812b17b2a74385ca3bb7d1e37059d4e9e053ceddb9b"}, {0xb8, 0x129, 0x7, "fea471ea3758b5ea13948fe903a80feca409e11020e20f941942d9933525192cd5cdbf25b43b328693658af192b848d3f70c3504a61ffb250036615c78ef3069fba05c74ccf2eaae5ad0a68afd078ad4e70428d08b0249e14e484f6455db979a909f946d901565aa5d7bce7452be46f782ed3d7f6d539b608c07c704c25d5cbc34fba531b92e28e8213025db2af840023ace1dbe38aded274fa429e39658a2d5b9d06f"}, {0xd0, 0x115, 0x5, "51a3d0d23646f11c953f6bcf2fd3f411ee3e8bd4349cbe7c111d75975b7025bce868a861246ca41451cbd72f0bb8e1ff10d47c2b04a9a9b49373f21fc2422c8b22e3857d8819258544fc38abc1fcf1d3c51902e0720f7e8d9044ac763b1b89adff253766cccbd552bb962b9767af95285b17ab06228a502dfd97c27c319cdf8474954c1ab221a4028154e5ddbb796acc199b548500b96df914e1d34d9ba58d86ff28c880190a2dcca2e216f7c6912faf9d4c53b3954cd96374df7b38"}, {0xc8, 0x109, 0x0, "2bc55755fcd766ab41f5d3f530e0a31b0f0c9f909cb034814ca5493217b9d17c616f8b7de8660ee4e0d9b9f255e0d26807c5318a423da872a9af3aee6a7b96f47842883df606d1756becb0993c596baffd60208946789a949160c3b402c81a319e799df6aab3d277c764ee708f315b4c35701d0a43d0e2c3f41188406eb86c162c6d6045b8f36185f845dc2f7e58daa104a11bc213526e27fe115a41c97f9d205416f7bdf912eecb28b8eb48781e2ddba3c1"}], 0x1428}, 0x4}], 0x6, 0x80) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x4008080, &(0x7f00000000c0)={0xa, 0x4e23, 0x0, @local, 0x2}, 0x1c) socketpair$unix(0x1, 0xb, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet6(0xa, 0x0, 0x81) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000100)=@hopopts={0x2, 0x12, [], [@padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x30, {0x9, 0xa, 0x55df, 0x2, [0x0, 0x39, 0x1, 0x0, 0x5]}}, @ra={0x5, 0x2, 0x7}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x9, 0x40, "1e594ee32b69c8d2547e2b30065d7d89c75b969247ca0cb061110b8bdcb1333b29458d693d6954c1bfb192daac0912ce987c47165083bba68dc1539e3c9fc683"}, @ra={0x5, 0x2, 0x7}]}, 0x98) sendmmsg(r0, &(0x7f0000003940)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}}], 0x1, 0x0) 03:08:28 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000000)=0xfff, 0x20) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x2) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000140)={0x0, 0x4d4017f, 0xd5d, 0xcf42, 0x5, 0x7}) write$P9_RLOPEN(r1, &(0x7f00000000c0)={0x18, 0xd, 0x2, {{0x80}, 0xfffffffffffffffc}}, 0x18) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) socket$inet(0x2, 0x80b, 0x80) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYPTR=&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f00000004c0)=ANY=[@ANYRES16], @ANYRES32, @ANYRES64=0x0, @ANYPTR=&(0x7f0000000580)=ANY=[@ANYPTR64, @ANYRESHEX, @ANYPTR64, @ANYRES32=0x0]], @ANYRESDEC, @ANYRES16], 0xffffff84) 03:08:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 878.410890] audit: type=1400 audit(1548644908.264:227): avc: denied { map_create } for pid=23303 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 878.562995] audit: type=1400 audit(1548644908.394:228): avc: denied { prog_load } for pid=23303 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 878.713454] audit: type=1400 audit(1548644908.564:229): avc: denied { write } for pid=23303 comm="syz-executor4" name="net" dev="proc" ino=57746 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 03:08:29 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x4, 0x4, &(0x7f0000000100)=@raw=[@ldst={0x0, 0x3, 0x7, 0x0, 0xb, 0xffffffffffffffff, 0x8}, @ldst={0x0, 0x3, 0x3, 0x8, 0xe, 0xfffffffffffffffe, 0x1}, @exit, @jmp={0x5, 0x2da0, 0xf, 0x4, 0xf, 0x80}], &(0x7f0000f6bffb)='GPL\x00', 0x1, 0xfb, &(0x7f0000000000)=""/251}, 0x48) 03:08:29 executing program 1: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000000000)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0x0, 0x0, 0x7, 0xfffffffffffffffc, 0x0, 0x2, 0x40}, 0x120) write$P9_RFLUSH(r0, &(0x7f0000000140)={0x7, 0x6d, 0x1}, 0x7) 03:08:29 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xd, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'nr0\x00', 0x20000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x38d}}, 0x0) write$tun(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0xff23) 03:08:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 880.061914] audit_printk_skb: 12 callbacks suppressed [ 880.061928] audit: type=1400 audit(1548644909.914:234): avc: denied { prog_load } for pid=23347 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:30 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x57e, 0x4) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x4040, 0x0) sendfile(r0, r1, 0x0, 0x6) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000500)={'syzkaller1\x00'}) sendmmsg(r0, &(0x7f0000001bc0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000001c0)="9980b712a73fd02981ef00128f9ab673ac1c39812ae2fd23cd912e188b3c93f778f1b39014738ab99d4cac77886c48ac69417a254d34f1536134f0e1c9812e9893f9dd", 0x43}, {&(0x7f0000000280)="ee34d8217ed64a03b25b810da35a910800a5305ade48330d1b57dae474d2ce78653ee535034c23e1c403901e49289392d95d56f869a84700e29abe9ea4781f94605c520f3a08231331be13b0f44c30", 0x4f}, {&(0x7f0000000300)="cd595df57cf9f9b836fbdf3bcf75094ca64217d66f4e844eea648c0c692459285147a5c83adae33b5e85624c1b322e77b6dc5695e4c783fa74f09a7eeb09a1ddc93627c6125c7a38ea7f0f000c8bdfb869f5374fd2d96b008c80b2aa7cd3c97613a2dfc50361e7cf51b47bc7d2c8040934c3de5430864c25780a9ec2577721941d927841814707cda0197d7f3a1e43831b126e5e97e41635fc190c76a367e2b2b8aea6", 0xa3}, {&(0x7f00000003c0)="0a68008039381f", 0x7}], 0x4, &(0x7f0000002080)=[{0x50, 0x10c, 0x8, "54d545511918fc35dadb9d62ba0625e070c59439f29266482602955ea26ce88526fdafb1c719c01896a56db55c3b86f12526d1a3acd885a0389bb3"}, {0xe0, 0x6, 0x6, "ecbeebb2cd4292b45c0bee3570aa39d0a44287fda2f71df621b23a2a877672c353e1d583d9cba4147225359ffe164a982bd5c40afb65dd2abb8f551434c2e1b5b2f30d0121b317130e8e598b4c41cd520e95929fd73b3d4c1867b0c0d052ada3adf02dfb4934a53006b4c4ed094e26d024d86ad3a9c500d7c25efda620e747e6669d07a6d751c405c2f2778f6cb369bac296a882f53a5925c5b94454622f028d7d1b4d0ad1a9ed5fe87337c71d5067a486e924cec8ae3fbbdebb4547d1a84d6bb0cd82ac60bb742a332a4889f3687c"}], 0x130}, 0x4}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000000580)="2eb3421af1f07636165ff7773e8ed1f29ae4d938b612233b80", 0x19}, {&(0x7f00000005c0)="0d2ddafd09a4c86c4a730694ff3ab9911a64359eac5b000463fd18be20960d31a38d9567b78dfcd9cb3c41d04973e2dbea2b2b12788c1f9f5a44eb2991c60a8626ee85d876b653e827a9dc71882bbd74a4adde0d564df4b9ace176150e451d3b29d72b45cda20a7f99717c5eb262ecfcccb83646d09eaca00b2223adf997701320a3f4b4559f287916b84a2a4c2ab27972ffdbbafdbc83096d037a14dd54e4fd6d358c89bd666729ea9e725b9f5fdfaabc4db6a0fea4c363623b8d6d35854342207cc6cbe9", 0xc5}, {&(0x7f00000006c0)="c8cd3b6dfdfcc6ae8eb1a1a2ae0cf9c3987b1670b902458ab5ebfa7759a35328b5bff3a6b6602c65786db23ee7cecdbf992c0ebab9327265d6d572e82797fee6ae5a7906ee3965b4b24d35e5660a2501a56ad329507b54d9cb744ce4a8e8b0d549b51631bb5671e9ce06489c8d98fdc16d042fd4369299e47149", 0x7a}, {&(0x7f0000000740)="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", 0x1000}, {&(0x7f0000001740)="a882ee6dcdaf3ae76e0a80f33bf67d38a9810d8ee885f6b377a813b8ba3af3570698bd023c84d2df362389d8c65f9f6fffa44a0005da7609103b728e316d805cd4991fa634a6f3d90da9f31fe455691340759c4370fc6bf7d1e0f5fb2f781e9143dea8f3", 0x64}], 0x5, &(0x7f00000021c0)=[{0x50, 0x103, 0x2, "f2896280fbfff737c2a77b78b7f595277750926793ec9283f4dc4d35f987497cf66c43ca175e80b7e88d4d25f1bf3b908dbcca887da6abe7de8f621e0f"}, {0x120, 0x10d, 0x9, "825dfb987a822ea907eafcad2606e3d2dacc3979c3869a7bc2838b741142bd88cd3bea2424de710d21e25540f0e299451adc5161f747f57d21ee17d76218532bed7cdca3b947dd5a070b238615548d5966c211b490639627489fbecd4f8bdbbcef6b4176f8e6ec55c38535da72bb859191f5414c586964f5db62156f053021d6499aef7bdff3e1843a1f88462dec453e54045e17d6fbb7156a2449b148910757146c53531f2d831e556e902c4af079fb7c20643bf394fa00abcb5114b3e4a9c7e17097550d751a1f30b0bf97ca08ffa67dca7c9d95ec2b5d18688ac14684b793dafac9f3d0608b7dee430b9827c135feec540cee00d38be19ed247ea0923c30bb6564adbe03e45057edf5d0e55fa0000"}, {0xb0, 0x10e, 0x400, "06a5e11e9c1d5bdfb255dbaf95b41865f7c4df1a152bf101ef4579422e0ee62c690b42fe385a588646d0f1f99b915ff3cca63536ba32c683be289f66be82cf43193154cc64ae6468e179f15a717f00638fb1136666e77e467ba6624669a5f510b9dfa5e9fd79f407a91c3de9d612afb2cf9d5b6a28dce0e89110dc6c0a9997c7f1231062fd0c99c388164d9fdb78c90da6debeaa0e5b77305a"}, {0x28, 0x10b, 0x0, "a42f7174682470d62c03dfb2074a0f4f1b0c"}, {0xe0, 0x101, 0x4c0b, "b4936ddedac1662d9f62fc78b141a4f0a38fd91f75e7eb009968cd8d9985c3dfeb6b485eb4ace419c47bb1c47240120fe1ef59ae0a154900f6370fbf67395ea4ad302ec14a8b0be5fc364a16dd8a93ee3bd4ae8454cd26f8f60eeb7143b680a5c7d22ea49a706b006f8ee90741f5701cff02be88e78fc308b086333a21c93d27a2d1f42127af3b793b87e449b24c1b97f2b5066ab095020cbd2e182fba114ec60da99ab5a3403f75db7799e3866b5b75d3a84296bf18801999af7dc3614efab6ad210bd46306865b1b526634522086"}, {0x120, 0x11d, 0xba, "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"}], 0x448}, 0x1}], 0x2, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000240)={&(0x7f0000000540)='./file0\x00', 0x0, 0x18}, 0x21d) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000004c0)=0x0) perf_event_open(&(0x7f0000000440)={0x4, 0x70, 0x2, 0x9, 0x5, 0x12, 0x0, 0x729, 0x0, 0xa, 0x9, 0x3, 0xa1, 0x8, 0x7, 0x20, 0x6, 0xbd7, 0x6, 0x6, 0x8000, 0x6, 0x8, 0x3ff, 0x200, 0x80000001, 0x80, 0x1, 0x70b, 0x7, 0x8001, 0x1, 0xb534, 0x8, 0x4, 0x39d4, 0x400, 0x8, 0x0, 0x8764fe3600000000, 0x4, @perf_config_ext={0x2d3, 0x7}, 0x3000, 0x9, 0x3d, 0x9, 0x7, 0x7f}, r2, 0xc, 0xffffffffffffffff, 0x1) ioctl$KIOCSOUND(r1, 0x4b2f, 0x0) 03:08:30 executing program 1: epoll_create(0x80143) lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x100000003, 0x0) clock_gettime(0x0, &(0x7f00000001c0)) recvmmsg(r0, &(0x7f0000000000), 0x0, 0x10000, &(0x7f0000000100)={0x0, 0x1c9c380}) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xf, 0xb, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, [@map={0x18, 0x0, 0x1, 0x0, 0x1}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x637, 0x0, 0x0, 0x0, 0x9}, @ldst={0x3, 0x2, 0x3, 0x7, 0x4, 0xffffffffffffffff}, @alu={0x4, 0xa23, 0xd, 0x0, 0x7, 0x8, 0xffffffffffffffff}, @exit]}, &(0x7f00000004c0)='syzkaller\x00', 0x6, 0x65, &(0x7f0000000500)=""/101, 0x41000, 0x1, [], 0x0, 0xc}, 0x48) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000600)={&(0x7f0000000280)='./file0\x00', r2}, 0x10) sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x130, r1, 0x5, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x642fedc1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x87}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0\x00'}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @loopback}}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3414}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x87}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x4}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8001}]}, 0x130}, 0x1, 0x0, 0x0, 0x40000}, 0x4000) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x14, 0x3e, 0x201}, 0x14}}, 0x0) 03:08:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 880.293564] audit: type=1400 audit(1548644910.144:235): avc: denied { prog_load } for pid=23347 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:30 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:30 executing program 4: pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz'}, &(0x7f00000003c0)='/selinux/avc/cache_threshold\x00', 0xfffffffffffffffc) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) uname(0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x40) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x200010005, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f00000000c0)=0x0) ptrace$setregs(0x5929499aefdf77dc, r4, 0x0, &(0x7f0000000400)="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") [ 880.886045] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23366 comm=syz-executor1 03:08:30 executing program 2: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = timerfd_create(0x0, 0x0) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/14, 0x34c}], 0x1) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_mr_cache\x00') symlinkat(&(0x7f0000000080)='./file0\x00', r2, &(0x7f0000000100)='./file0\x00') prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000290000/0x3000)=nil) io_setup(0x0, 0x0) [ 880.907584] audit: type=1400 audit(1548644910.724:236): avc: denied { create } for pid=23361 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 881.050458] audit: type=1400 audit(1548644910.854:237): avc: denied { write } for pid=23361 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 881.517884] audit: type=1400 audit(1548644911.364:238): avc: denied { create } for pid=23361 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:31 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) syslog(0x9, &(0x7f0000000340)=""/4096, 0x1000) r1 = dup2(0xffffffffffffffff, r0) getsockopt$IP_VS_SO_GET_DESTS(0xffffffffffffffff, 0x0, 0x484, 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x20000000141042, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$binfmt_elf64(r2, &(0x7f0000000480)=ANY=[], 0x2e7) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000080)='yam0\x00', 0x10) statfs(0x0, &(0x7f00000000c0)=""/234) ioctl$IOC_PR_REGISTER(0xffffffffffffffff, 0x401870c8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlinkat(r2, &(0x7f00000001c0)='./file0\x00', &(0x7f0000001340)=""/47, 0x2f) sendfile(r2, r0, &(0x7f0000000000), 0xa198) lsetxattr$security_capability(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='security.capability\x00', 0x0, 0x0, 0x0) setxattr$security_smack_transmute(&(0x7f0000000040)='./file0\x00', &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000240)='TRUE', 0x4, 0x1) [ 881.550536] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=23366 comm=syz-executor1 03:08:31 executing program 1: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x100) r1 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0x0) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000400)) unshare(0x3ffffff9) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setfsgid(r2) close(0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r0, 0x0, 0xfffffffffffffeb5, &(0x7f0000000140)='/dev/loop#\x00'}, 0x30) get_robust_list(r3, &(0x7f00000002c0)=&(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)}}, &(0x7f0000000300)=0x18) getpid() setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5, 0x10, r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000005c0)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000600)={{{@in6=@loopback, @in6=@mcast2}}, {{@in=@multicast2}, 0x0, @in=@loopback}}, 0x0) r4 = socket$inet6(0x10, 0x80e, 0x8001) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000b000)=[{&(0x7f0000010000)="5500000020007fafb72d00b2a4a2809302000000030343ee6b26236925000a0000000000130000008848a3c728f1c46b7b31afdc1338d5440000000000000000000000088daa7227c43ab8220000bf0c00157400d4", 0x55}], 0x1}, 0x0) ioctl$TIOCGSOFTCAR(r0, 0x5419, &(0x7f0000000000)) syz_extract_tcp_res$synack(&(0x7f0000000340), 0x1, 0x0) [ 881.834982] audit: type=1400 audit(1548644911.684:239): avc: denied { wake_alarm } for pid=23387 comm="syz-executor2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:08:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 882.286113] audit: type=1400 audit(1548644912.134:240): avc: denied { syslog } for pid=23394 comm="syz-executor4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 882.318863] audit: type=1400 audit(1548644912.174:241): avc: denied { wake_alarm } for pid=23387 comm="syz-executor2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:08:32 executing program 2: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)=0x0) fcntl$getownex(r0, 0x10, &(0x7f00000002c0)={0x0, 0x0}) r3 = socket$inet(0x2, 0x3, 0x100000000033) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000440)='nlmon0\x00', 0x10) fcntl$dupfd(r3, 0x0, r3) rt_tgsigqueueinfo(r1, r2, 0xb, &(0x7f0000000300)={0x1e, 0x4, 0xfa}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000080)='\x00'}, 0x30) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x0) syz_mount_image$vfat(&(0x7f0000000200)='vfat\x00', &(0x7f0000000480)='./file0\x00', 0xffffffff00000001, 0x6, &(0x7f0000002780)=[{&(0x7f0000000580)="270910413203c7bab971208ba657226b2e385ea79ce64c5cf146571bc6e15577251f346689adabeb01e9f5e80a7fdb8a1bfbe111f28daa43d85d97a12bf5e91d26b5e3edff14d8a931d7b5f981fa89db17f4fdb3b4f2da04195cd233eabacf321ce624a588c7ba6cfcb1a554a3fa05b4a05aead198f144252f62170cc2b082adf29014bdbf26f6b35dbec290538e6794e9a4a691070fde66c45490d902195163024c8c401a734d9d3b60de3006d21c59eb7150b8efd1069de6150ecffc31bd199257693913c796426fea953459a435537acc833c2ead81a9a7ca865cd6aa7bbc584b2790b273ad87", 0xe8, 0x5}, {&(0x7f0000000680)="d0ffb0e50485b24916feccdc8b134aa4d38cc58bb534d1471457cd34885215ab86f79a232e4ad3dc095f09e6aaee653a92409bcdcfdfc0e425a7108be789420f07a8036aba6c481a09eb9efc7fb68f5f766f4f4dda32e026398d16c4c042553f0a2e9992cf52c53455a76d002fdcc17e577baaacd07e17346d3dd8a8082521d04e42d13dc7867b8117e726d8553762317c6f54a6018ce878b8f745c4ea11e718ea412df82d", 0xa5, 0x6}, {&(0x7f00000004c0)="d89f03248f9b42319e539121bc7c3c87fa3f3d4d17b947c301a0f2167f8ef68d34730123d894053bc7ba88cf0a31a3067ac6fa9b0b7f1d41127cba075cd0ac3227af1985c474308a65f0fc8db64e91672e5a774e269daedb9eddf8f465001b29f0f1a3415df6e1642e53c2643154c8c688fc340e0b9a9d5aa914c1e2", 0x7c, 0x8}, {&(0x7f0000000740)="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", 0x1000, 0xffff}, {&(0x7f0000001740)="c4454747f507361c5795ba3959ea8d57620bf11919afcbebd10cf6b52a9708b3902d346d4289dafba1ba668ea94b8c05bddd7a0d516dc322dd2860b1be7f9e0109fb68b5decee7e7795a8704e21bb7a56c1ce32abe1345e789923a1506b0a5fda3cb082bb17555b12d9f46d35aa43674e617db3ad669e3ac1669b738aaa23e7068ccee042f752b15fd5b4f63949c64a320408f95cb8cd2c0496b28a0c05ff64377b30622aed6f3b7ae31331e9dcaf8cec701c5bd008f6eb1214c60ff1ad2913f67e9a5da80609135d1c7a60b7f5d0770355d5c6e2823b9c88e943f134f8d222db07ea818723cf32c94d36a7b02f7ff8c5d968b1e4d2b4fc016e9769016d5b65afca8307931501b8edcf71983154a1fd0357cc6426f1c421f210b57645629261cebffded6dc3948e48b030a408900a356055d6f01dd86173c28f26e74017934a28c22bd1fd70ed31e61982cbed945d8fa7cd541ad794da8ecb7025649aa4e6dde6a7f7474c39638f9317d99ca4ac9d8c82d4c8f28ecf4bde859b4300ebcb01436ff8198f3b4327c6a11b3cd33c4676a33397d74faef5171aa7a448bd9e0c823ba031b1421bdbd2e29b6ef2526da4446b11f2a2bcfe0143aba99924dd043d5a4bc65702066c05d1650113706d4eb1c29359909585849a4ba17cdee0fbbee022bf30567b1113668413e909ea5e5b730fa881c96350559e6a6abb51f66cbb18419ae0747bc432b1d9c36ebfd580f2708e690fef50049ef96f3edbcbbda137a0d79de7368748d1e630685e78023d8b6833f9324b4275366e6a7686e93bbbe2c7b87a19affed46cb72f4c13fdc2b4c8df45baef1ce169254df4514b7010e7ed69e9c9c40c31c37b4af6aff82723bb03337a6cfe95c998d248e8109062733c362527c68f662b9d2b1c6ef5fa3c043da5a49b5d1137a8fe9607855599272658bb26268732fa13253c9d638eb0401486ef4986d8fd7e745d23502a5b8bcf0052bd78041e97d2856dc4535c56859e065a8747a498ad341aaf6cfa30a2cbac96fb1762a8c9202870d87cd75b9b8731c51a45852a54c3495fd7d9e08288aaab83f6644ad74713b22b9e3dc4c9d55dce93e0395a952e0b0cc04bcd299cebd824bfc73e1b8484d79a3cf80a981cbc5b463c65970827eaf3ccfd79cb1d72c951926937266d8b0ef11cdcd9a905a133c3bd80fbdb52c07e438251d3a711b320babb66d4222434e5757224748e36f6e220bd08523c8f66fd11907058b53f7ce8b0ad9d792d95a5492cfc83275c76c730c0c1168bcc405a882c665639658c9031852113444548eeb42f4d19a67f73397b7f1be313fd08b5de449704eaca171c3f0ed5b4af3bc6276d80f4b5b09686dfcd63656bb4ff4b0496f350c5042d0031e1f1c8aee225888b0490b6b345f284c0d1ce087fc3418e05ec60f7682fcd93f1f33fcfef5326c7b0ca96848b6ba3acd32de7acfdf1aaa8a5f939b66f29af7160637e72ab982d83a65b850d033c41ae9eae0f5891fe88f0aeee156d2fc1924649899b3c41eb45c9c758316ede10e05f216bd34bf0b4ba36061cc8646d327803605c85ca2a3c142ceda0e2bf46948580e511d0904c5944a08d44c4d576c37ded65c2adde6e4003141d5e23a8d9424ef5a7cb60b2db28e1619ed7946f71b995c6fd5e1a0c8cf95374ba74281b3ac2e084d8a43f57d5ec139af3cdd100b63ee463d484eb8003c07de6c289ea865a7035b0b704662290b7e2b62315f35a8d98097ea7703fe69191da171193fd1eedf0209c062c1df5f64496b0e5ac4c49a5594d77ea59f8f4613af9781548d6742c94bd3112a2435456ceacad90ae390ae1aebbddf86efcf7ffbb79aeb74dcbcf14337d0bd7e60174dd22dfc22c439fafbc602672516a5aa653b96121c9df068645aca8fde1d0bb50568760702e9a918136b7f162d7dc075732550f917d29def402aaf731e8ce2b29aa5396a95ae8bdb30b03ce226cbd4690577a74d92564ef01dd815b8aa9c118da43f5582aff011b1112a46fc1cef96dd9fa01867c608ff471491acf36fab10b9b08585c13f30df689fee1e4a3b5835f962bf8005870794005853465db460541f3e2405fd4d3e41a5aef1fbfa2a967b2039bbe5d880f40127671ea0ed0af784146725dd234af3dfa5358537cb0dd8b4d314a4b9d757504f955f024dc86f35975ec085e33bf4659efeb6ee6abd970117808039294d40b21a2fecb78359bab6bc458acef067e35aaae90c34143aeedc9beb066f2bb6ad6cd0a52e5aef4e7541f62da799537771e2ad67ea613309af121a0aab37d4f114ab51f1cfcea54d490cf790558dd0db58aa6d03e2da21c57a55730c6b1d7e73d04eff5b0ef4cb25cd07c05e89ee07b23b73ad20ec36fc7a51434fd5ac599bf1f83207ff931f303813d92356e9ea4379c8938f461a3c12e2f93808b25d71c8549c4d5bd3d1e8462c9b596239bff60989d9d454eb6c8f321dbadf3e3a033e5546d23078ce3ad2e15677e0a1a9d2c7d2ffc6f93bf843007a10c2ec984ce3fc5d29ca8d759351648e855650cd3231d6dd681435615bf94d488b10bdee979ac8645063920e03a6ba4a752edd63408cff648b7fa0e7c3086d4e6dd1bdb5255fa8706280232c99c80e3ed59db0bcfa504fdb391171316bfac3326df414d13d405730d4ccff4aef3136354433d34760779601aefcf83cff0cbb8c85d338db768c0c28bc5035665f4719aade44db6dc0df9919a1380948fb22105cf03b73b126991f01244f2cdb117bb7c5da985df9553e23619ddba14b1b6a13365db5d44f977c39e35a4b6583cf70cab0316fdbeaa25897dc5d0327298c840dcb6df770c268b167439ce027c571c38147dcb9cb6ce37958c00437e4e289f980cffd460dbe4149eb2f9908c641508aeff4eabcd3a649d269bd9c59a9f614816faecade8b492ff2b2dc6570a835b9ae40abfdeb64dc2cbb9fc5b28ea438bcf4a2b5750ca9fd9dfc72d8e48080c74fe1a85a596555d11c4b3dcbba5560c9611e00da4bad5184d09e0926338a6007906d488ca1a38b7291c32392253a6afd01de9bf3cc464b54c899a0e34261172729b68f14463b8f7e66447c740b16fa1e73945c5499bbdfc673300a4fc70d09af7755125fd23232a059bfed977207fc93c673aec075ecb267a48c131575492c931ae90f60806aad64a4254c143c05b96965a9928f2a87e2e856c0d60bacab028237804f339874b8ce4b56b9197f0f8d48b2a8c0fc992009a0193c154ab8363fe375a929b9e2d66964a72b8d64f72c970c5c8c9cd2ed23c48503ba9bbd59e9b57cc8fcc79c492340c50926fc3cb53ac494a149e15e65dd2a9fe06b11e698e20672728fd5f82c56ae52d065ce719edebb780b4f5cb91c46fda2b519a8669648caf31ac5ad86309b7b83b5a77b713b68ebbb01deb6d39d5f91230d592774f5b8486da3bc291121aaaa8ce0c7fe2b62e248da2f9605fce604f1b5de0eb5dff52f4393e782d231f14977da16c20c4460393f75aa3a887f53e6036fe0b0f0c2637152ecc4fca8f3f4483412de3b8ec1116d862c9fd5759533b84623f1b14d0864716c19b17f5471d406f4a3c7efd97743b6f3fda548dd3f6e0c26de686b57dd69abeb9fc3696e9a94f6195edf3c9db3255a815a4d88e0876eb62601e0e00fe8b05cb0677c263ccd41c90d67de9b97f8c081134101d6c73493bae6a876706a981cddff36572391be17314a0d19382b151e7cc4906cf25ed33e3a14ef9cbb94677964200c02fb444776efec46751ed744c0403edf748a737764bce5ab766883e1e1e39da56a428ab4bf023cbedfad1fda0299f0056245719f1ecba84788529fe3ace2aa97bcd8f05f623bd60e001bda703455f8a4b1e85c1dde43cd48781fe93fcfc141cfe2f2c72923df599432044215fccd6f53cb60f07439409cfcab7e1ed0222994afe22eeabcd0c337ac676e25591f5f90dfad0dd4ed2cb3cd67d4d23fa1854d656b53b7a8af71a1ac7f9e5502cae4653fb112722ae387475dbeeaf25112fd52ed9c435de960f21b1bca262cf54cee6ac616110eb6675424b16427b5a644a4c2044bc2500960a94c8831fe2f8ae9a7aa26b2de181f2ade21d263492e83e44c5d603a3a96ab40aaa89ebb1b2a208c9411717c989fce326a3a75ef0110dc312e75bd07db3c26bd9aa481eed172a5381ba6773eee4ba0f091e9a11c29f094b8bc090c6294383e9ef5cc1e78ad57c33ec1675bb6e718910da55fde8c27a88271b8ff4913695f6e8cb85ac783eff49124a7bb7c42ae99c66488b50367ee5a7837ce453b120ff572121ee3cc7dc4a9aa81b36b03c445e82bd0c1c27915bb1d4d1a8862f278627f3ec637a48de32ae0179fdac4c20fa5db37fc9675108d308e17663b365204aeba651f2cbb593cfa79b36380837e8d72b9f21d19383f0c7c73355abd5a837796657f8a6d49c87853012ceafa98c0a994a090786cd02bf09d560df3959249ea1c4db2b420f87fb1a0e7e2a83fceb7adc21a1e1af7d0a97e9c2b12d1e94578eda2d56d10fb78a2548b98099cb241b6bedda371ba77804cf85f3b0ac1161addcf618009b821dcf7ba555506b23581997855f20c7cd809bbba3442bf3da3e2735eb12c6008fd91a554abfeec42b1f7debd9eddd6d3499d053dec72d573084560e685384e8566c573e3150e347bd0be4a9e58819491ddc62b55cf648c56645d02bf9c36478d0c97d07931968d82708007a461be9c1d0905ec06031320e6611b94a5026c045adbf00a439172a41434aa8a1d649f2f9f5fc9b805bb184ad68c153261bc5c76c3e051e5a77aa2cc54b94e3a30846a53ac3e3bb19c4a92a2b237600314613c4f02191850c946a020f258d4445b5c46303afb7eb66aa3f2fadffa2d6afb0aab7b1036129bd0ab9177003baf5b8afc583cc235acdcc90931dcad5fb68c790ee6031a0600b24b27e925b26b3dcdbce781aae8d9f33f41e9d83a521095bcd40f0133b62577c5d7e555ce544f145f0cfe805eca427381a76487301ab86efebafac59a7177ca8cd6af91abf01a7f834f322628e06f07e19dd4a9c6f184dd21dfd7961f895dfb3fd9ac93a24ebec013ead82e43ecedeb24f721b4084581b9947003cf4b5577d089dcfb9538c7a1dd5e423fc8d18d0fdf58f89d0aaa725a70bd9a12d7b14e832c467dae659afd4290d97849e72d37855966a1c4c8bc55b7acc69cb0c3308b50cc1edb7d61327d77fa70a9ef9838e6772aa680585e065b29aad8f316c1665cf655bab0e357557b6379badcb5fdc99448751f1744e1ec355bbe26f1ef7ce3aa0bfd242fca361bd7451f6020199f5f6feb31f150a135dcba45b527e9099a36cae059a4e028cb817920c8427fef2d1b2b87cef66102f826b799c80201e16b915942e4c70c3f6d23e25b6e2cdb5d6b7f12f1c4c2eb12ba53c20bf74fe5cf3cde49bc66c137f2da5cfc721e5577d2e313f89319b6741b6cd14531321fc5163836417d933fcff60ef6b93c6077324ed9a394f37d0e764ed009400c02c4e47a8d4d375283c26d06d2857b31a40e151ba6688e15af8116e13bbcfe5a455076ae90753acf55d39837514a2dd6be50285b4de03a913dd222ef9d4893980b9f7216f4f314d6816d37f3fd723a06b3c83d924661c626af5a75c92e2ee29096da76392bc0a9e52d1c9ab91036a68396efab5c432921e5bc9a6fc26de853374834c15d69a179883bfb37f0c127358e8a1183303ad4314997c348d223ab7ca78ac44d2b6a3d523e229fa2f27af96267f552ff5a1e2dc6051eaed03d1c1b8299e8e83b", 0x1000, 0x9}, {&(0x7f0000002740)="ead4376dbfffd8b436667a24b83dfca7", 0x10, 0x20}], 0x940000, &(0x7f0000002840)=ANY=[@ANYBLOB="756e695f786c6172746e616d652d6c6f7765722c73686f727469786564e6ac000000000000"]) io_setup(0xb, &(0x7f0000000240)=0x0) setxattr$security_ima(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='security.ima\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="b5bd0000000000000051ce1b82b447551b"], 0x11, 0x2) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000100)) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000, 0x407000}]) io_getevents(r5, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x1c9c380}) lseek(r4, 0x0, 0x4) 03:08:32 executing program 1: r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)) write$P9_ROPEN(r0, &(0x7f0000000040)={0x18}, 0x18) fcntl$setstatus(r0, 0x4, 0x44000) ftruncate(r0, 0x10001) io_setup(0x4, &(0x7f0000000300)=0x0) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x10000}]) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000100)={0x0, 0xfffffffffffffffd, 0x4, 0x0, 0x0, [{r0, 0x0, 0x10000}, {r0, 0x0, 0xd6a1}, {r0, 0x0, 0x7}, {r0, 0x0, 0x200}]}) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) [ 882.321190] audit: type=1400 audit(1548644912.174:242): avc: denied { wake_alarm } for pid=23387 comm="syz-executor2" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:08:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 882.816519] audit: type=1400 audit(1548644912.664:243): avc: denied { syslog } for pid=23394 comm="syz-executor4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:08:32 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:32 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000540)='y\x00', 0x2, 0x5) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r3 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x3}, &(0x7f00000000c0)="c93e4c7c8d32b2b7dcad9f43faff642aba332e1dfac31470620eae07cb6cf463a975f3b14ebff7eeddf6fe178577ae7c90c9bb3c605ad3956af696ac3e85fcffa7bc61d7c03d474dd0cbaa7c2ac256f09476058e98bada857f60f1fe29f689dad95878427dbb6c4f4eb771e9", 0x6c, 0xfffffffffffffffe) keyctl$get_security(0x11, r3, &(0x7f0000000200)=""/67, 0x43) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000400)=0x32, 0x3c7) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f00000003c0)=0x4) sendmmsg(r1, &(0x7f0000000000), 0x40000000000016d, 0x2007fffff6) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000180)=0x400, 0x4) setsockopt$sock_int(r1, 0x1, 0x3d, &(0x7f0000000480)=0x8bb8, 0x4) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) setsockopt$packet_int(r2, 0x107, 0xe, &(0x7f00000004c0)=0x2, 0x4) select(0x0, 0x0, 0x0, 0x0, 0x0) 03:08:33 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x800, 0x0) r1 = request_key(&(0x7f0000000180)='rxrpc\x00', &(0x7f0000000500)={'syz', 0x0}, &(0x7f0000000540)='trusted\x00', 0xfffffffffffffff9) keyctl$get_security(0x11, r1, &(0x7f0000000580)=""/44, 0x2c) getsockname$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) perf_event_open(&(0x7f0000000400)={0x1, 0x70, 0x80, 0x0, 0xffffffff80000000, 0xc4, 0x0, 0x40, 0x40000, 0x1, 0x4, 0x5, 0x1, 0x49cb, 0x8, 0x7, 0x1, 0x400, 0x9, 0x0, 0x6, 0x0, 0x10001, 0xffffffffffffffc8, 0x100, 0x200, 0x637a, 0x5, 0xa5, 0x2, 0x1000, 0x204, 0x5, 0xe198, 0x20, 0x8faa, 0x1, 0x101, 0x0, 0x7, 0x0, @perf_config_ext={0xa57, 0x7}, 0x21000, 0x5, 0xffff, 0x8, 0x7ff, 0xfff, 0x1}, 0xffffffffffffffff, 0xb, r0, 0x8) r2 = socket$unix(0x1, 0x5, 0x0) r3 = request_key(&(0x7f00000002c0)='trusted\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='/dev/null\x00', 0xfffffffffffffff8) add_key(&(0x7f00000001c0)='pkcs7_test\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)="b25665bee7acb34deeea85505a917284b5a0e6dbc3c9dd9bfd99797817135448dcbf0f01f0335e7250fc07be941e897a31ef3936d908f41f44acef249b47709c5be97883726a787fbeeba5adcd89204e22b7b300578c8550389f", 0x5a, r3) bind$unix(r2, &(0x7f0000000000)=@abs={0x1}, 0x3) recvfrom$unix(r0, &(0x7f0000000740)=""/156, 0xffffffffffffff12, 0x2022, &(0x7f0000000900)=@abs={0x1, 0x0, 0x4e20}, 0xed26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000380)='syz', r0}, 0x10) bind$unix(r2, &(0x7f00000000c0)=@abs={0x1}, 0x6e) 03:08:33 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:33 executing program 2: socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000006c0)) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x14000, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x402000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in, @in6=@mcast1}}, {{@in6=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000240)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000002c0)=0xc) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)) r3 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f00000003c0)={{{@in6, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f00000004c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6}}, &(0x7f0000000600)=0xe8) setresuid(0xffffffffffffffff, r3, r4) mknod(&(0x7f0000000000)='./file0\x00', 0x14c, 0xf) r5 = geteuid() setreuid(r5, 0x0) ioprio_get$uid(0x3, r5) 03:08:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:33 executing program 1: r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000140)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000080)=0x1c) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r1, 0x8932, &(0x7f0000000000)={'syz_tun\x00', @ifru_ivalue}) r2 = syz_open_pts(0xffffffffffffffff, 0x200800) ioctl$KDDELIO(r2, 0x4b35, 0x1) 03:08:34 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0xffe}) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000200)=0x1, 0x4) stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)) stat(&(0x7f00000008c0)='./file0\x00', 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000a80)) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000600)=ANY=[], 0x0, 0x2) eventfd(0x400) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000180)) r1 = socket$inet(0x2, 0x3, 0x9dd) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) r2 = dup3(r1, r1, 0x80000) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000280)={0x10, 0x9, {0x0, 0x2, 0x3ff, {0xd5, 0x444}, {0x4, 0xa6}, @ramp={0x102000000, 0x1, {0xffffffff00000001, 0x0, 0x5e, 0x5}}}, {0x57, 0xcca, 0x10001, {0x7, 0x80000001}, {0x100000000, 0x100000001}, @cond=[{0x9, 0xfb3, 0x8, 0x18, 0x4}, {0xd46d, 0xfffffffffffffff8, 0x5, 0x3e, 0x3, 0x1}]}}) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r1, &(0x7f0000001640)=ANY=[], 0xf5aab446) vmsplice(r0, 0x0, 0x0, 0xb) 03:08:34 executing program 4: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x21) sendto$unix(r0, &(0x7f0000000080)="37ae1b3574c873f6db3a16f6a2a813dba31c1f76e4a86105fd72d92d8f5fe7b1fa6413e290408ea7ce7d9ab3360b58abc94e76786c9dedc7acf5e119d1ffbd60ce53586b0eaf1958caa17130f05d427a8bf44a50815acc37bfb112d6fa6d025d4cf31252e1d0f1736b7a6fcb26faaa65dc7339d4ea4d54d7c24b37e68a6e0d64ebe86f988b655e1ea2b88ec7c349a436f9ad99df5a5a5da8797ac6ef294ebecb", 0xa0, 0x800, &(0x7f0000000140)=@abs={0x1, 0x0, 0x4e21}, 0x6e) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000001c0)=0x101, 0x4) 03:08:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:34 executing program 1: r0 = socket$inet6(0xa, 0x8080b, 0x403) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) link(0x0, &(0x7f0000000080)='./file0\x00') ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) write$P9_RXATTRWALK(r1, &(0x7f00000001c0)={0xf, 0x1f, 0x2, 0x1}, 0xf) fstat(r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpu.stat\x00', 0x0, 0x0) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f00000003c0)={0x8001}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) sched_getscheduler(r3) ioctl$FS_IOC_SETFSLABEL(0xffffffffffffffff, 0x41009432, 0x0) r4 = inotify_init1(0x0) mount$bpf(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440)='bpf\x00', 0x48, 0x0) fcntl$setown(r4, 0x8, 0xffffffffffffffff) fcntl$getownex(r4, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$setopts(0x4206, r5, 0x0, 0x0) r6 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RNDADDENTROPY(r6, 0x40085203, &(0x7f00000005c0)=ANY=[]) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000180)) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={r3, r1, 0x0, 0x9, &(0x7f0000000300)='yam0\x00\x01\x17\x8b\x00', 0xffffffffffffffff}, 0x30) ptrace(0x4207, r5) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'yam0\x00\x01\x17\x8b\x00', 0x8001}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000240)={'IDLETIMER\x00'}, &(0x7f0000000280)=0x1e) ptrace$setregset(0x4209, r5, 0x20000004, &(0x7f0000000040)={&(0x7f0000000040)}) tkill(r5, 0x1a) 03:08:35 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b400009500000000000000"], &(0x7f0000000200)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3:Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xd9\xdac\xfd\r\xe1\xef\f?\x9e\xe6\x1a\xbb\xa6\xd0G\xdc\x9bW\xa1*&\xcb\xacz@\x9d\xe1[d\x1a\x13B[d\xf7\xa2\x1b\xd0\xdc\x93\x8d\\\x9b#L\xec\xfby\xbadU\xe8\xf90\n\x18j,\xf1!\x0eG\xcf\x94fy\xb5\x9b\x15)\xd8,\xe6l\xd9E^\t\xa7L\xb3O\xa0\xd2q\xf3\xf5\xa0\x86\xa3\xb2C\\\xff\x1c\xa2,\x91\xcf\x12!\xf5\xe4\xeb\x85\xaf17\xc8&\xe9\xcb1F\xc9x\x8a\xa6\xdc\b\x00\x00\x00\x00\x00\x00\x00\x8f\xe0\xb0\x19\x03\xfa{\xb9\xcbT\xef\x9aP\x9dT\x15\x1d\xa9M\xc0\xd6\xdc\xe8S\x84\xb9S\x03\x8bO)\xa6\xe9Tv\x01=\x00\x00\x00\x00\x00\x00\x00'}, 0x48) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000040)=r0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000080)={0x265, 0xffffffffffff1af3}, 0xc) 03:08:35 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'veth0_to_team\x00'}) sendto$inet(r0, 0x0, 0x0, 0x20008800, &(0x7f00000000c0)={0x2, 0x4e20, @multicast1}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f0000000180), 0x0, 0xfffffffffffffffd, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003a40), 0x703, 0x22, 0x0) 03:08:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f00000001c0)={'syz_tun\x00', @remote}) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'netdevsim0\x00', @dev={[], 0x2a}}) [ 885.970533] audit: type=1400 audit(1548644915.824:244): avc: denied { prog_load } for pid=23485 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 886.162068] audit: type=1400 audit(1548644916.014:245): avc: denied { prog_load } for pid=23485 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:08:36 executing program 2: futex(&(0x7f0000000040)=0x4, 0x0, 0x4, &(0x7f00000000c0)={0x77359400}, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x3, 0x2, 0x8, 0xffffffff, 0x2, 0x3e, 0x7, 0x138, 0x40, 0x20, 0x2a0, 0x90, 0x38, 0x1, 0x0, 0x1, 0x4}, [{0x70000000, 0xff, 0x1, 0x8, 0x1, 0x4, 0x6954, 0x1000}, {0x4, 0x8f, 0xffffffffffffff69, 0xd02, 0x8, 0x6, 0x100000000, 0xfc68}], "d70edb1629859055bbe6eda41262a6e03050ef1858db0db59d6f8bc91b96e54ceb360af75296e1c0d5d287e017796a2e0c94c4727e451050cc85d07b037d8bb8e5be98c46b444eb6387656dd72e89606816a4dba1573d60fd5148c5a85be486ef98835b18f441834c21152eb4778bdfbc9a5118131fdd63807bfdbcb4c3aee5c0ebfb14d424a8f161f1507fe9b0f096f9785c8bf2e370edad4d28055fbb7708329350bf0fa5b09743b153300a7cf3d7892f37a5b", [[], [], [], [], [], [], [], [], [], []]}, 0xb64) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000100)={@mcast1, 0x656, 0x0, 0x3, 0x2, 0x8, 0x7}, &(0x7f0000000140)=0x20) futex(&(0x7f000000cffc), 0x800000000005, 0x0, 0x0, &(0x7f0000000040), 0x0) 03:08:36 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:36 executing program 4: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = inotify_init() getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) r3 = open(&(0x7f0000000240)='./file0\x00', 0x40, 0x0) write$P9_RREMOVE(r3, &(0x7f0000000280)={0xffffffffffffff3b, 0x7b, 0x2}, 0x4af) write$binfmt_elf64(r3, &(0x7f0000000640)=ANY=[@ANYRESDEC=r0, @ANYBLOB="85b439e6bd6da86d4840854e529207c57aaa41644f158b91d71b5a0aef604fbb64c8eb695b39ff80721581951b33b498ff3255ef33f101d2b0fd52e71de738373c67b140c8295c53c1f87cbd435b1774d90d54dbb08c28c58419b73a1d23354547785c273cc2542dbf15559631874f035fd6b34fa8f9a9d86fb48cbb020ef3c609492ab0fc9005ae155c64ba391fabe9b91d9484abe04abfda9fec87ebe846ed15f518cba5c8fe054b028cfb01f93d0ddc5ddccf5216e10e444f0a1391d2b4ed84f39810359f94c226002249a28e059c50e0e8f8c2f25cffc5989a8a2b1e00000000000000000000000000", @ANYPTR64, @ANYRESDEC=r1, @ANYRES64=r2, @ANYRESHEX=r0, @ANYPTR64=&(0x7f0000000600)=ANY=[@ANYRESHEX=r1, @ANYRES16=r1, @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="f6badbd7a393de0e786385b100c8301a0fe0bc410bd3a3b07a9e9a49fef164dc30698554a8df997d7d5244ff72e51ccf01ce95b5d877c4c50639765ba872a72f9753d96722c1d3ccd9cfe7ccd57c4f88a3ef2bbceca7830cd576165832bd5333ecf8c7fba85c04889ea127a2d852f463990faa65e2b84a724c7aa8813fc40b7f9f5ea83f08b91a658d1492a23d817c144d3e79c3474e31e1a7b932329a16764a7b11ef3cd471a9a995f1d9514a57c8cacd2f40df3f6718f5cb88d3a7ddcfa0d10145bfd0ed289e5c8b1e04f2900b04d6659da8795ceab80987b1129d0cea79ecc991af129604261f93ab1541d0ee5b56"], @ANYRES16=r3, @ANYRES32=r1], @ANYRESDEC=r1, @ANYRES16=r2, @ANYRES64=r1], 0xffffffffffffff1b) openat$cgroup(r3, &(0x7f0000000040)='syz1\x00', 0x200002, 0x0) remap_file_pages(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x1, 0x1000) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(r3, 0x5601, &(0x7f0000000080)) syz_open_pts(0xffffffffffffffff, 0x0) sendfile(r3, r4, &(0x7f0000000200), 0xa198) getsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000100), 0x10) lsetxattr$security_capability(&(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000340)=@v2={0x2000000, [{0x8}]}, 0x14, 0x1) 03:08:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) r3 = dup3(r2, r0, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_STOP(r3, 0x54a1) ioctl$TCXONC(r3, 0x541d, 0x0) 03:08:37 executing program 1: r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) ptrace$setopts(0x4206, r0, 0xffffffffffffff01, 0x0) tkill(r0, 0x1f) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x880000000000000, 0x1b}) set_tid_address(&(0x7f0000000000)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$setsig(0x4203, r0, 0x6, &(0x7f0000000040)={0x3e, 0x9, 0x4}) ptrace$cont(0x1f, r0, 0x0, 0x0) prctl$PR_GET_SECUREBITS(0x1b) 03:08:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:37 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x20000000a00) fsetxattr$security_smack_entry(r0, &(0x7f0000000400)='security.SMACK64EXEC\x00', &(0x7f0000000440)='system@ppp1\x00', 0xc, 0x1) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) fstat(r1, &(0x7f00000000c0)) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) getegid() openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x80, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r1, r3, r2) 03:08:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x400200007fe, &(0x7f0000000000)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f00000016c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16], 0xffffffe6) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='bbr\x00', 0x4) 03:08:37 executing program 1: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x40, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x40000000011, r0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000000)=0x9) 03:08:38 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 03:08:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:38 executing program 1: r0 = socket$inet6(0xa, 0x8, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x4000, 0x0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000100)) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000040)=0x5, 0x4) ioctl$SIOCGSTAMP(r0, 0x8906, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x94b, 0x4) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), 0x4) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x240040, 0x0) ioctl$VT_RELDISP(r2, 0x5605) 03:08:38 executing program 4: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$msdos(&(0x7f0000000100)='msdos\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000240)={[], [{@fsname={'fsname'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_type={'obj_type', 0x3d, 'vmnet1%trustedsecurityppp1eth1{:,!$securityselinux,&)bdev'}}]}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0x200c0, 0x0) mount$fuseblk(&(0x7f00000001c0)='/dev/loop0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x28485, &(0x7f0000000340)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r0}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xdcf}}], [{@appraise_type='appraise_type=imasig'}, {@context={'context', 0x3d, 'sysadm_u'}}, {@euid_gt={'euid>', r0}}, {@appraise='appraise'}]}}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)=0x0) sched_getparam(r3, &(0x7f0000000180)) 03:08:39 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x5) r2 = pkey_alloc(0x0, 0x2) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) pkey_free(r2) close(r0) accept4(r1, 0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 03:08:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 03:08:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 889.919160] audit: type=1400 audit(1548644919.774:246): avc: denied { write } for pid=23565 comm="syz-executor4" name="net" dev="proc" ino=58036 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 03:08:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 890.123700] audit: type=1400 audit(1548644919.974:247): avc: denied { add_name } for pid=23565 comm="syz-executor4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 890.283578] audit: type=1400 audit(1548644920.134:248): avc: denied { create } for pid=23565 comm="syz-executor4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 03:08:40 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f00000000c0)=""/71) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) r1 = socket(0x10, 0x400000000000003, 0x9) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000140)=""/178) write$tun(r0, &(0x7f0000000200)={@void, @void, @eth={@local, @local, [], {@ipx={0x8137, {0xffff, 0xf0, 0xf68, 0x5, {@current, @random="aee0bece46f8", 0x9039}, {@current, @broadcast, 0x4}, "c4f643c9eff56698ba4fcfc260cf39912211a9eadd2302c2a20ba8cb75b6356c5dc6533de16aef5055272c531852b3fbdbf10db9fa7b5be6daf8e23142418f36a45d5ab24c1f41ae17b5b764a8c9e9e2ad51029b8006b75dd9cb9dcecaf89a937bea1535300cba3aa7f43cd010164bb94771e462ece0cb0a299332a155f8f9cc1d77d404cde9093ad76f7750104979afa672fafe75605aead63c39d7ee662a5034715274883159f5cdeb461cc3e2ccf755f55ae4395cc0fcfd1c5aecd34180a5760124768c7225f9037dfe231f6929c36417"}}}}}, 0xfe) r2 = syz_open_procfs(0x0, &(0x7f0000000a80)='net/fib_trie\x00') sendfile(r1, r2, 0x0, 0x100000001) [ 890.551451] audit: type=1400 audit(1548644920.404:249): avc: denied { write } for pid=23565 comm="syz-executor4" name="net" dev="proc" ino=58036 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 03:08:40 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 890.790928] audit: type=1400 audit(1548644920.644:250): avc: denied { add_name } for pid=23565 comm="syz-executor4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 03:08:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 890.995522] audit: type=1400 audit(1548644920.844:251): avc: denied { create } for pid=23565 comm="syz-executor4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 03:08:40 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000300)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'lo\x00', 0xd806}) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f00000001c0)={&(0x7f0000000240)={0x44, r1, 0x410, 0x70bd27, 0x25dfdbfc, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x3b}, @FOU_ATTR_AF={0x8, 0x2, 0x2}, @FOU_ATTR_IPPROTO={0x8, 0x3, 0x29}, @FOU_ATTR_IPPROTO={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_AF={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x40001}, 0x4000080) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x307e00, 0x0) ioctl$VT_SETMODE(r2, 0x5602, &(0x7f0000000080)={0x8, 0x5, 0x2, 0x1, 0x6}) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000100)={0x8, &(0x7f00000000c0)=[{0x80000001, 0x6, 0x3, 0x3404}, {0x5, 0x8, 0x5, 0xffffffffffffffff}, {0x8, 0xf9, 0x1, 0xfc00000000000000}, {0xfff, 0x80000000, 0x9, 0x5}, {0x9, 0x80000, 0x5, 0xfff}, {0x401, 0x3, 0x2}, {0x3, 0xcc0c, 0x3ff, 0x7fff}, {0x3ff, 0x7fff, 0x6ff1, 0x7fff}]}) 03:08:41 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0xfffffffffffffec7, &(0x7f0000002b80)=[{&(0x7f0000001880)=""/190, 0xbe}], 0x1}}], 0x1, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='net/icmp6\x00') preadv(r0, &(0x7f0000000000), 0x0, 0x0) 03:08:41 executing program 1: sched_setaffinity(0x0, 0xffffff66, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x800000000002, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x2000)=nil, 0x2000, 0x0, 0x4011, r0, 0xfffffffffffffffd) mount$bpf(0x0, 0x0, &(0x7f0000000140)='bpf\x00', 0x20000, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) write$cgroup_type(r1, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 03:08:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 891.696542] audit: type=1400 audit(1548644921.544:252): avc: denied { create } for pid=23610 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 891.852758] audit: type=1400 audit(1548644921.694:253): avc: denied { write } for pid=23610 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:41 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000702000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x80004e22, 0x0, @rand_addr, 0x40000000000}, 0x1c) listen(r0, 0x2004) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = socket$netlink(0x10, 0x3, 0xe) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000180)={0x14, 0x49, 0x2, {0x80, 0x4, 0x6}}, 0x14) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a0676ffffff81004e220000000058000b4824ca944f64009400050028925aa8000000000000008000f0fffeffff09000000fff5dd00000010000100000c0900fcff0000040e05a5", 0x58}], 0x1) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f0000000300)={0x4, 0x84bb, 0x500000}) r4 = socket(0xb, 0x8080f, 0x401) bind$inet(r4, &(0x7f0000000200)={0x2, 0x4e24, @broadcast}, 0x10) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000ffd000/0x1000)=nil, 0x1000}, &(0x7f0000000240)=0x10) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f00000004c0)) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000480)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000500)=ANY=[@ANYBLOB="240100006a7a404f5b7f86c1c1a1be8d98179c033c6019cc3ac2967e51547d161f62f7470b9d5f19bfecf7a15bddfbc3fdc1b4bf2711e0a2a185d02482c6c7064ad936ce460ca499c973288fdf1401bf2584fda1e87f696dab4b1dbe34dc7a67fc7509955ae2e37b2f5007de39cb3bd6fdcf73e5f1d67416f060fde3f9848fee4c678901b517419d7b76", @ANYRES16=r5, @ANYBLOB="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"], 0x124}, 0x1, 0x0, 0x0, 0x48000}, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f00000001c0)=0x1, 0x4) 03:08:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) 03:08:42 executing program 1: r0 = dup(0xffffffffffffffff) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x3, 'team_slave_0\x00', 0x3}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000280)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) 03:08:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 892.404097] audit: type=1400 audit(1548644922.254:254): avc: denied { read } for pid=23610 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 892.482010] audit: type=1400 audit(1548644922.334:255): avc: denied { create } for pid=23610 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 892.484346] audit: type=1400 audit(1548644922.334:256): avc: denied { write } for pid=23610 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 892.741189] audit: type=1400 audit(1548644922.594:257): avc: denied { create } for pid=23630 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:42 executing program 1: r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0xa54b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)={0x13, 0x3, 0x8, 0x8, 0x3a, 0x1, 0x1}, 0x2c) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000002c0)='memory.stat\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000300)) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RNDZAPENTCNT(r2, 0x5204, &(0x7f0000000080)=0x7) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000280)={&(0x7f0000000040), 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r3, 0x300, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xfff}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x101}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9dd}]}, 0x38}, 0x1, 0x0, 0x0, 0x6453595f756ab162}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x9) sync() 03:08:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x0, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 892.743489] audit: type=1400 audit(1548644922.594:258): avc: denied { write } for pid=23630 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 893.258279] audit: type=1400 audit(1548644923.104:259): avc: denied { read } for pid=23630 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 893.428352] audit: type=1400 audit(1548644923.274:260): avc: denied { create } for pid=23630 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:43 executing program 4: getgroups(0x1, &(0x7f0000000040)=[0x0]) getgroups(0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xee01]) setgroups(0x2, &(0x7f0000000200)=[r1, r0]) r2 = socket$inet(0x2, 0x2, 0x1) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000000)=0x4) 03:08:43 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f0000000180)=""/4096) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000000)) 03:08:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) 03:08:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:44 executing program 1: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="2600000022004701050007008980e8ff06006d20002b1f00c0e9ff094a51f10101c7033500b0", 0x26) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x100000000, 0x100) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000d9bffc), 0x4) sendto(r0, &(0x7f0000000080)="120000001200e7bcc84b27d9ea61505faa2c", 0xfffffffffffffffa, 0x0, 0x0, 0x0) getsockopt$sock_int(r0, 0x1, 0x4, 0x0, &(0x7f00000000c0)) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)=""/205, 0xcd}, {&(0x7f0000000380)=""/120, 0x78}, {&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f0000000440)=""/129, 0x81}], 0x4}, 0x2) recvmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 03:08:44 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@rand_addr="489592572ca0aed6de1b4bc6da12572c", 0x0, r4}) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="d214c0e12eb5e6ea076cca63e0537907"}, 0x1c) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000080)='trusted.overlay.opaque\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x1) 03:08:44 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'vlan0\x00', 0x1000000802}) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000100)) ioctl$TUNATTACHFILTER(r0, 0x401054d5, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x4) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000040)) 03:08:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:45 executing program 1: r0 = socket(0x400000000010, 0x3, 0x0) memfd_create(&(0x7f0000000040)='\x00', 0x4) write(r0, &(0x7f0000000000)="240000002100255107000165ff00fc020200000900100f000ee1000c0800060000000000", 0x24) open(&(0x7f0000000080)='./file0\x00', 0x400, 0x8) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) syz_open_pts(r1, 0x40001) 03:08:45 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) 03:08:45 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0xfffffffffffffffd, 0x31, 0xffffffffffffffff, 0xe) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x14, &(0x7f0000000340), 0x4) 03:08:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:45 executing program 1: sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x300, 0x0, 0x5000, 0x1}, 0x0) 03:08:45 executing program 2: r0 = epoll_create1(0x80003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(r2, &(0x7f00000001c0)='cpuset.cpu_exclusive\x00', 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)) r3 = syz_open_procfs(0x0, &(0x7f0000000300)='fdinfo/3\x00') ppoll(&(0x7f00000003c0)=[{r0, 0x1000}, {r3, 0x2027}, {r2, 0x10a0}], 0x3, &(0x7f0000000400)={0x0, 0x1c9c380}, &(0x7f0000000440)={0x401}, 0x8) ioctl$sock_inet_tcp_SIOCATMARK(r3, 0x8905, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000140)) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r0) fcntl$addseals(r0, 0x409, 0x1) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000080"], 0x119) socket$inet(0x2, 0x0, 0x0) write$UHID_INPUT2(r4, &(0x7f00000003c0)={0x8, 0xffffffffffffff4e}, 0x6) preadv(r3, &(0x7f0000000480), 0x1000000000000237, 0x0) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000240)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r5, 0x0, 0x70bd2b, 0x25dfdbfb, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40000) getpeername$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000180)=0x1c) 03:08:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x208000, 0x100) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f00000001c0)={0x4, 0x8, 0x41, r2}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:46 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x400002) ioctl$LOOP_SET_STATUS(r0, 0x4c02, 0x0) 03:08:46 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x80247009, 0x0) 03:08:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 897.009284] audit_printk_skb: 24 callbacks suppressed [ 897.009297] audit: type=1400 audit(1548644926.864:269): avc: denied { create } for pid=23721 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:47 executing program 1: prctl$PR_SET_MM(0x23, 0x2, &(0x7f0000ffe000/0x1000)=nil) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x2, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000040)=""/208) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffc000/0x4000)=nil) [ 897.327553] audit: type=1400 audit(1548644927.154:270): avc: denied { write } for pid=23721 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = request_key(&(0x7f00000001c0)='dns_resolver\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000340)='/dev/fuse\x00', 0xfffffffffffffffd) add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r1) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 897.642118] audit: type=1400 audit(1548644927.494:271): avc: denied { create } for pid=23721 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:47 executing program 2: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, 0x0) syz_open_procfs(r0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x3d) connect(r1, &(0x7f00000001c0)=@in={0x2, 0x4e20, @local}, 0x80) sendmmsg(r1, &(0x7f00000002c0), 0x400000000000253, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$unix(0xffffffffffffffff, 0x0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000066fff4)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) 03:08:47 executing program 4: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000040)=0x9, 0x4) r1 = syz_open_dev$mice(&(0x7f00000005c0)='/dev/input/mice\x00', 0x0, 0x0) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000000)) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='net/igmp\x00') socket$nl_route(0x10, 0x3, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={&(0x7f0000000080)=@nl, 0x80, &(0x7f0000000540), 0x0, &(0x7f0000000240)=ANY=[]}, 0x0) preadv(r3, &(0x7f00000017c0), 0x1fe, 0x400000000000) 03:08:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x3, &(0x7f0000000240)=0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/status\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000015c0)={'veth1_to_team\x00', 0x100}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000013c0)='/dev/rtc0\x00', 0x2, 0x0) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/current\x00', 0x2, 0x0) io_submit(r1, 0x1, &(0x7f0000001980)=[&(0x7f0000001940)={0x0, 0x0, 0x0, 0x7, 0x2, r4, &(0x7f0000001880)="feea3e16fea9f36f88dc348fef209c8f55504d06858ebf2c0f5dec96fd2cddd0d1c3e5f30bea25e8b9f020c8800df665d293cc0d96d3b77480dea694de545e002a9e59ef21e6eb13e83d58c08f184c916ee85cb8717ccf5555effa20e415712e86515d7a5dcf0861743ede0f3ba43c3c711c3df31c2a1b35db1aac368b37b207c8e67c46377142165d2853011d0ca34518fe93a4c57e94e6ac5e3da2fbbcfde7d2a3e0138eb2cce9e506aca8e32b699a48ed969dd04658", 0xb7, 0x4f, 0x0, 0x0, r3}]) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001500)='/selinux/policy\x00', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000001580)=[&(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x10000, r0, &(0x7f0000001440)="b29826ebb0289fa270e5f2c00d1e39ff0382f991e1fd74b0b01cc49e0160be5e11eea7ac67c7a325f58c66086bb253336a36fb2f1cccd1cddfbbec169c1561a40d95a4a2c04f9b2dffe51a6b3805c4e522af74b35722313868434931bd7dedcc6d55547958cd337484e2f8668a7aad812fac2427d163ee8620646b112e694656c0107b7bdfa7403f37649808c7d6037ae076e6ff1741f6369ac0ba34a74b39ea74ea86", 0xa3, 0x7, 0x0, 0x4b715278059f64f2, r5}]) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x0, @remote}, {0x0, @dev={[], 0xe}}, 0x9, {0x2, 0x0, @loopback}, 'veth1\x00'}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@window={0x3, 0x1, 0x17aabe88}, @mss, @window={0x3, 0xfff, 0xd42}, @sack_perm, @sack_perm, @timestamp, @timestamp, @sack_perm, @mss={0x2, 0x80}], 0x9) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x8e, 0x100004, 0x0, "8a7954bb181e8a43e7e25422db99e761", "93dea264710e09d2d8040e474e16cf0380c685a74fb6b0ea08bcaf38614e36b0dfd7fbb8caa00de1f23831bf3f24cd6a4bc0cd073e7714fa447f8e226fb4846394ef77795e3e87b510d04f859aef27ec6a02b9d96a0ce46cde95101619e0bc485424dd6fe16a935da4104a4e3fbd8382f376b1a439f8dd0a2b"}, 0x8e, 0x1) io_setup(0x67258b7a, &(0x7f0000000200)=0x0) io_destroy(r6) 03:08:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou=\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:48 executing program 1: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) clock_gettime(0x0, &(0x7f0000000c40)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000c00)=[{{&(0x7f0000000840)=@ax25={{0x3, @default}, [@null, @bcast, @default, @bcast, @remote, @netrom, @bcast, @rose]}, 0x80, &(0x7f0000000b80)=[{&(0x7f00000008c0)=""/109, 0x6d}, {&(0x7f0000000940)=""/85, 0x55}, {&(0x7f00000009c0)}, {&(0x7f0000000a00)=""/148, 0x94}, {&(0x7f0000000ac0)=""/9, 0x9}, {&(0x7f0000000b00)=""/75, 0x4b}], 0x6}, 0x2}], 0x1, 0x2040, &(0x7f0000000c80)={r2, r3+10000000}) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') fstat(r1, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r4, &(0x7f0000000800)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x8040002}, 0xc, &(0x7f0000000740)=[{&(0x7f0000000180)={0x244, 0x2d, 0x300, 0x70bd26, 0x25dfdbfd, "", [@generic="115ba848f8d574eb0e4d93488386b7b02688ea5284cf1779da2ee290f4548a6045d208ee33ec0179323752104e4ea7a91962ca178a5e52447324b72bfc4ded170cbd4df6ba86af1c7b6ef227e57f084ca818b7fc29bf706e27daa207f7736ba3baa402f4dde8e9f7753214e41d37f870bcda67d234fb4666f0ddfc2335af32ef4b8f535c4c8992dae35b4cd90fdc5a203b4e4c1c90295b634d71f332e7f42ad5b24ac1eaf044ce3874fd02e4c7eb4417f941c9e9bd89591b92984a51b196", @nested={0x140, 0x2a, [@generic="627a212f990885a5a14b2c3e6543ca46781e49378574d239ef77afe6be5d9753d6bf392a40775ee7e312b1cdc5f9432c1462dc9f9d9dd937e99a14805e1671627620b8910347f1f38b1d33ee7c786a5335382843cdd63b6c8374d2aa09ea881b5792177a661aeeec0ba4ca907be6f1069158562bf9032b8d55f9d00e0cbe4c90155e9e4cc2385b359764145739c3cd0252238197337e9e62f43971dbeca03fb375947225c83c2ccc06250c628d616e2a3285e7d33340814aae22fb1dec399eb22b43daa4f690bc8b15d36e5f76abfc4d6a8816ca34a9550d0a3d44be7e9a094e4076ff705f", @generic="99c3952d89f44526813aa3d11d23d4ef83caa70d07cd669177681d60c7d16d793331e852dcc5", @generic="74cdf6248c43750dbd11fb1a528caa905b6b106382f295e2688d756ff18fee0caa31f4765b9d80c17fc841242ed3"]}, @typed={0x8, 0x28, @str=')lo\x00'}, @typed={0x8, 0x73, @fd=r0}, @nested={0xc, 0x8e, [@typed={0x8, 0x2c, @uid=r5}]}, @typed={0x4, 0x40}, @generic="d93b6d564a0ec12900cd4e391cafa76a81540b0c5023"]}, 0x244}, {&(0x7f0000000400)={0x18, 0x15, 0x1, 0x70bd25, 0x25dfdbfb, "", [@typed={0x8, 0x7e, @str='\x00'}]}, 0x18}, {&(0x7f0000000440)={0x22c, 0x33, 0x100, 0x70bd27, 0x25dfdbfd, "", [@generic="ac6b9920a101c1ac19ba1462c7fc0f82bb0b5f9ed9625e79aa60ab84f609eac93197eb03f19c41a95868ef1a2dba02c60bccad299f629f8995094471a9d49e69205f6c0e84749eba301d5a256de2d9b0a0017371d556da51c12a363f445a091a9a5bd96f808453a6fe3624fe1c720e65110184b099c28d2ac63987", @generic="040b629fcefd70d17961265c48dbfae3dcedab6cad8392439d8cbed1acb32b105759e340ccb2dd205f0a3a31557e4ec3d582d6a924328b76ee06cb20f7995d0d713ffacc9b0f204188b04da27e5b8a559804b6bb3791ea88c61f7a5bd2e7bd360483981a248be60314cf042804618bac04790f732d8e337afa9e641c1fbe791dda251c2aad9b6a25054e09083d804e99b83e56990cd9d4179534d2e1f7412ecd211be5486ccec90be8454ddda02ccfa42be6", @typed={0x8, 0x42, @fd=r1}, @nested={0xdc, 0x2f, [@generic="09eab653cab39a7eb312e3279ef9765cc5ea9e2b90ef794b07a66fde2af6b89857907d23df4e0a2ec725b127a1294000f7ed7107c507917850a3f7b7edc7d773c8375a20ebc6cb03256f16077df25ba7012ce4718adf3a71dc4c6a621a5e3c719feece80342c4a33ec8f209a086fa07035532554aad8", @typed={0x8, 0x6, @ipv4=@local}, @generic="8f84d49307523c31abca2df7f5", @generic="6084576372c1c8194655a2faa46e3c1c5754cf9eff2b654b7f5608cb3088149da887a93ede9cf9034e88d19c2d5c82b4", @typed={0x8, 0x9, @fd=r4}, @typed={0x14, 0x4f, @ipv6=@dev={0xfe, 0x80, [], 0x19}}]}, @typed={0x8, 0x1f, @u32=0x3f}]}, 0x22c}, {&(0x7f0000000680)={0xac, 0x20, 0x734, 0x70bd27, 0x25dfdbfb, "", [@generic="781e7103593ff2b7755a8a627a3ec9d01bf7d13bddce6344131991574813a51adc41a045daf6e0354b7b16afc3651666391351cc64655c6f9fa28f9075738b76cf46bc5d02ccaf4c1d4a8dec6bd58c33934cf0b0f9b67371a53d06297b7477ef25c4dc525b78a9f59502d5e3139b40f647d3c0d4c90c62abb95748934b992b67c6e39956bccc335d569db5c4b302258de80bc9db290182c90f83bf"]}, 0xac}, {&(0x7f0000001480)={0x14fc, 0x3f, 0xc03, 0x70bd2d, 0x25dfdbfc, "", [@nested={0x16c, 0x73, [@generic="855c26c2f253c6d4fb92e5bfb17058a5696edb7e0b0fe29f12e93f4ae567a43cf2b50582b7f4b11f569955216e0a9cfcdd24a909905470919186c8b2", @generic="d18a86585b9994b20d5243e55080218497756fabe70c92dc043c1e197efb33e93fff79741a9d5b37bb5dee94d3a28678d9ec3b303b0e8d7024c9a59617ffdb23b285b62f6feae83cb9e5e7eef145fa53c3ba6b17628e248a24ca138f47c1a238caee2dcba5b478e61335e318630a214539f98dd1da73b3be7e2ee0bf8fd765d1296d4f103df5d269f3c70be09c07a43aa20818df113f962cd6da4910554bb6b69fa3593630c42bdda40d7482b2ff1bfc7483916955324abdb1da0d54ca4df721df2f8e51eeda3c502bd528d4dfe7467a7e82dafe20666190e32b506284bfdcd6a425c076a6ae93247f479a927e288161a78b", @typed={0x14, 0x5c, @str='net/anycast6\x00'}, @generic="e7a0c37c479f6b88b0efc15b86983c15e7c098a770ca983f0e977222075a58cfefd4c697d5c1"]}, @typed={0x4, 0x80}, @nested={0x124, 0x75, [@generic="5848301a869ad0ece43edb4d7018275370d477ef0a6206adbd3e27e0a9bb55dd2635a9e032aa1b5b5fa8e2f38cd5bbca21374070c090ba87590fdaf898569c5be8bcf2e840adc6104b92461cff760860b9e3c39cb4c4192651cad790e924eec78f73ee6b45d3e31d86d30084c6f0f4bcc81fcdae20e9efbaf769ed2ba7951dd2", @typed={0x8, 0x87, @fd=r4}, @typed={0x14, 0xc, @ipv6=@local}, @typed={0x8, 0x7a, @u32=0x2fc}, @generic="e54ecf6095d2e6e4314eff7b43572076b90bcaf3dc8182288aca535fffe66deb4bc1710453e91e0bb9b8bef2eb1ce8fd36a126970bf463d7d9135f7b6c5d7dffbf08cbc771c9334dfbe3a836e8aa5bcd87", @typed={0x14, 0x12, @ipv6=@empty}, @typed={0x14, 0x1, @ipv6=@loopback}]}, @generic="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", @typed={0xb4, 0x19, @binary="6ef36311b49172b31ab7972990d5bf6846d8f5be3e5973123378a44621ffac60c67b6c924bb71d5b00cbab641340773316bc883bd51866aa4c457f1466c9568080cb921841a8d237cca474fb013b3b184125306e35f7e8db109720cad9ab59d4c38e4818e3ddb0988c919656ab0ef33c5da624119bfc9e7b6df1637851c80f2202338123d1a4ce81a34661b71ce97d526652307d601dac8fc4802fb2b909316e33a7ebe66e4cc27560a60f6040"}, @generic="b4955a7c298964f98cb49243b25ab517b175ca04a94e7c587c3400c8c98b5c20b127bc441fd93dfc3f927c06a4e4ac1d85a73e323b6231b5be318ffe6c3c8332594e269f1c26716756de498c3178a1cb0973ee8b2e4064935b487ad847f03e8fe120a809979530bb6a6087e2d34f7fcc1354f5662034ab2fd42f9d", @generic="b36f07d35a146a635bdb97fb3e376a03bd0a07796f7ff49a394171f6cbf7e9b49a5f807f2f89722be97b9dfa7a8db1746808", @generic="a750855affc231ab13549298e04a4b54ab1f8189e803dcb48890a01cfa2931f63dee40269d44342d32108994e3b8eb2748bbb9a84da95ea94ff30560f4e78bc5a3e55926723b3232cd4c24e420e5042161840cd2158922d4a964e9c30aaddec5b0375b383b4c53b7d0a42f0bc5bac3501c2eaba3c3e577cdbf871d801871a4d9cdf176b56a1229518fabdfdb3b5e0b59825ee09d37fc1292437a07ce6e07dca3ae6dfb95cf01dbe4b1ab4f5ec837c02e140f7982e3840f0f4d8b35454b0ce5aad211654b461082138a7d960877cbb818d9fcbe930103292de210b8db6aca8663c0446699b2fc2479ddb077873470374f4fd0967c4c9c"]}, 0x14fc}], 0x5, &(0x7f00000007c0)=[@rights={0x20, 0x1, 0x1, [r0, r4, r4, r4]}], 0x20, 0x24004084}, 0x10) preadv(r4, &(0x7f00000017c0), 0x1d0, 0x1000000) 03:08:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x80000000000, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, 0xffffffff80000001, 0x0, 0x2, 0x0, 0xb3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet(0x2, 0x80003, 0x3) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x2, 0x4e22}, 0x10) recvmmsg(r0, &(0x7f00000004c0)=[{{&(0x7f0000000400)=@ethernet={0x0, @dev}, 0x0, &(0x7f0000001680)=[{&(0x7f0000000140)=""/217, 0x4a}, {&(0x7f00000002c0)=""/135}, {&(0x7f0000000380)=""/67}, {&(0x7f0000000500)=""/133}, {&(0x7f00000005c0)=""/4096}, {&(0x7f0000000240)=""/4}, {&(0x7f00000015c0)=""/136}], 0x0, 0x0, 0xfffffffffffffd31}}], 0x6fdaec, 0x22, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000100)=0x6, 0x49) setsockopt$inet_int(r0, 0x0, 0x7, &(0x7f0000000000)=0x9, 0x4) 03:08:49 executing program 1: prctl$PR_CAP_AMBIENT(0x2f, 0x4, 0x400) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0xb01, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0x100000001) 03:08:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:50 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000000)={0x1, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000380)=""/148, 0x3a3}], 0x1000000000000206, 0x0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) ioctl$EVIOCGKEYCODE_V2(r3, 0x80284504, &(0x7f0000000240)=""/47) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') preadv(r4, &(0x7f0000000100), 0x2df, 0x80000000000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r4, 0x2405, r4) stat(0x0, 0x0) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000140)) getresuid(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) getresuid(0x0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) setxattr$system_posix_acl(0x0, &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000c80)={{}, {0x1, 0x7}, [{0x2, 0x1}, {0x2, 0x3}, {0x2, 0x3}, {0x2, 0x2}, {}], {}, [{0x8, 0x7}, {0x8, 0x3}], {0x10, 0x1}}, 0x5c, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)) 03:08:50 executing program 1: rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="7890c7003f6e9b9f2fbf338547a309be4a6537af2a2861515769da3972a7d2a9dba64366db3b52dc7f0b2a151b2def08d481f62c728bfecaa110af563d55b9c4d61b807c451e1a9700c540b14708915926012d896bf29195f1456af67a8668172bc29271244ecd7a4fb39bcd12d64f097b8a01c5220889f23a68021f065941a61a0b8cd1fe1884d8d9d8d75a3323fd8db3f6cb99cd4f081b279c1d4da97d"], 0x1}}, 0x4) r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) socket$inet6(0xa, 0x6, 0x100000001) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) rt_sigtimedwait(&(0x7f0000000040)={0x4df}, 0x0, &(0x7f0000000080), 0x8) setxattr$trusted_overlay_origin(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x800, 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000009c0)) getsockopt$sock_buf(r0, 0x1, 0x1c, &(0x7f0000000100)=""/40, &(0x7f0000000140)=0x28) write$apparmor_exec(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'sit0\x00'}) [ 901.157251] audit: type=1400 audit(1548644931.004:272): avc: denied { create } for pid=23812 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000014c0)='nbd\x00') r3 = syz_open_dev$mice(&(0x7f0000001500)='/dev/input/mice\x00', 0x0, 0x400) sendmsg$NBD_CMD_STATUS(r1, &(0x7f00000015c0)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x1401}, 0xc, &(0x7f0000001580)={&(0x7f0000001540)={0x38, r2, 0x1, 0x70bd2c, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r3}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x400}]}, 0x38}, 0x1, 0x0, 0x0, 0x8800}, 0x40) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) 03:08:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x121041, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000180)={'team0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000380)={@rand_addr="910d57d15836bd3203835b807505df9d", r3}, 0x14) write$FUSE_ATTR(r0, &(0x7f0000000300)={0x78, 0xfffffffffffffffe, 0x5, {0x5, 0x9, 0x0, {0x6, 0x6, 0x0, 0x10000, 0x7, 0xd0ec, 0x10, 0x3ff, 0x400, 0xa907, 0xb1, r1, r2, 0x3, 0x200}}}, 0x78) r4 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x0, @empty}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r5, 0x0, 0x2a, &(0x7f00000001c0)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r4, 0x1, 0xe, &(0x7f0000000080), 0x4) [ 901.263958] audit: type=1400 audit(1548644931.114:273): avc: denied { create } for pid=23817 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 901.276450] audit: type=1400 audit(1548644931.124:274): avc: denied { write } for pid=23817 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 901.312017] audit: type=1400 audit(1548644931.144:275): avc: denied { create } for pid=23817 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 901.521613] audit: type=1400 audit(1548644931.374:276): avc: denied { getopt } for pid=23817 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 901.720499] audit: type=1400 audit(1548644931.574:277): avc: denied { create } for pid=23825 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:52 executing program 4: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000100)={0x1, 0x1, 0x3, 0x2, 0x100000001}, 0xc) r2 = inotify_init1(0x800) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000000)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) ptrace$setopts(0xffffffffffffffff, r3, 0xfffffffffffffffd, 0x400) fcntl$getownex(r1, 0x10, &(0x7f0000000180)={0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_opaque(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)='trusted.overlay.opaque\x00', &(0x7f0000000500)='y\x00', 0x2, 0x390ed9525106a9b7) syslog(0x9, 0x0, 0x9f) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000001640)=0x3, 0x4) r6 = socket$packet(0x11, 0x0, 0x300) r7 = dup2(r6, 0xffffffffffffffff) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r5, &(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10) rt_tgsigqueueinfo(r4, r3, 0xf, &(0x7f0000000200)={0x40, 0x3, 0x8000}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0x28, &(0x7f0000000280)}, 0x10) sendmmsg(r5, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$TIOCSTI(r7, 0x5412, 0xfffffffffffffff7) 03:08:52 executing program 1: openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) open(&(0x7f00000001c0)='./file0\x00', 0x240, 0x4) memfd_create(&(0x7f0000000140)='bdev\x00', 0x0) ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000000100)={0xc2a5, 0x2}) write$P9_RREAD(0xffffffffffffffff, 0x0, 0x0) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000200)=""/198) syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x892, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigpending(&(0x7f0000001280), 0x8) ioprio_set$pid(0x3, 0x0, 0x0) 03:08:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f00000000c0)='\x00', 0xffffffffffffffff}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000001c0)=r1, 0x4) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 901.731472] audit: type=1400 audit(1548644931.584:278): avc: denied { read } for pid=23817 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 902.018437] audit_printk_skb: 6 callbacks suppressed [ 902.018451] audit: type=1400 audit(1548644931.864:281): avc: denied { create } for pid=23817 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 902.085225] audit: type=1400 audit(1548644931.934:282): avc: denied { create } for pid=23817 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 902.154428] audit: type=1400 audit(1548644932.004:283): avc: denied { read } for pid=23825 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 902.186801] audit: type=1400 audit(1548644932.034:284): avc: denied { write } for pid=23817 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 902.200891] audit: type=1400 audit(1548644932.054:285): avc: denied { create } for pid=23825 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000001480), 0x1000) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 902.203166] audit: type=1400 audit(1548644932.054:286): avc: denied { write } for pid=23825 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 902.358872] sock: process `syz-executor4' is using obsolete setsockopt SO_BSDCOMPAT [ 903.346105] audit: type=1400 audit(1548644933.194:287): avc: denied { syslog } for pid=23858 comm="syz-executor4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 903.495330] audit: type=1400 audit(1548644933.344:288): avc: denied { syslog } for pid=23858 comm="syz-executor4" capability=34 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:08:53 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) io_setup(0x8, &(0x7f0000000100)=0x0) r2 = socket$nl_xfrm(0x11, 0x3, 0x6) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) bind$packet(r2, &(0x7f0000000040)={0x11, 0x0, r3}, 0x14) r4 = dup(r2) ioctl$TUNGETFILTER(r4, 0x801054db, &(0x7f00000001c0)=""/107) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) io_submit(r1, 0x214c, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r0, &(0x7f0000000140), 0x5ee}]) 03:08:53 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x101402, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000040)={'ifb0\x00'}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_SET_FD(r1, 0x4c00, r1) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) openat$urandom(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rt_sigprocmask(0x0, 0x0, &(0x7f0000000280), 0xffffffae) dup(0xffffffffffffffff) unshare(0x40000000) open$dir(&(0x7f0000eb6000)='./file0/bus\x00', 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x141000, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x2, 0x22402) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./bus\x00', 0x0, 0x20) r3 = accept$inet6(r2, &(0x7f0000000200)={0xa, 0x0, 0x0, @mcast2}, &(0x7f00000001c0)=0x1c) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000340)='highspeed\x00', 0xa) r4 = getpid() r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) setpgid(r4, r4) ftruncate(r5, 0x8001) open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) 03:08:54 executing program 4: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ion\x00', 0x0, 0x0) r1 = socket$unix(0x1, 0x6, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) execveat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)='\x00', &(0x7f00000000c0)='/dev/ion\x00', &(0x7f0000000140)='/dev/ion\x00'], &(0x7f0000000400)=[&(0x7f00000001c0)='eth1\x00', &(0x7f0000000200)='/dev/ion\x00', &(0x7f0000000240)='*ppp1\x00', &(0x7f0000000280)='/dev/ion\x00', &(0x7f00000002c0)='/dev/ion\x00', &(0x7f0000000300)='\xacvmnet0\x00', &(0x7f0000000340)='/dev/ion\x00', &(0x7f0000000380)='/dev/ion\x00', &(0x7f00000003c0)='/dev/ion\x00'], 0x1400) dup2(r1, r0) 03:08:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x400) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000180)=0x100000001, 0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x4, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x1}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) fsetxattr$security_selinux(r0, &(0x7f00000003c0)='security.selinux\x00', &(0x7f0000001480)='system_u:object_r:udev_exec_t:s0\x00', 0xffffffa4, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:54 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) flock(r0, 0x1) flock(r1, 0x100000000000001) socketpair$unix(0x1, 0x10000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x80040, 0x0) flock(r0, 0x2) 03:08:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:55 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = epoll_create1(0x0) open$dir(&(0x7f0000000340)='./file0\x00', 0x800, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000001c0)={0x10c, r5, 0x2, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x82cd}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x27e20af0}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x400}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x64e8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xffffffffffffff13}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x4c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000000}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x400}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8001}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x18000000000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x10c}, 0x1, 0x0, 0x0, 0x10}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000b82000)={0x10000004}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x80, 0x0) epoll_wait(r3, &(0x7f0000000100)=[{}], 0x15555555555556f8, 0x5) dup3(r3, r1, 0x0) 03:08:55 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x1000000000000000, 0x4, 0x1, 0x5, 0x0, 0x5, 0x40, 0x8, 0x8, 0x20, 0xe4, 0x3, 0x7, 0xae, 0x8, 0x800, 0x200, 0x88e, 0x7, 0x4000, 0x401, 0x265e, 0xfffffffffffffffe, 0x9, 0xb4, 0x5, 0x1, 0x6, 0x8, 0x18f, 0x40, 0x9, 0x7fffffff, 0x2, 0x3f, 0x6, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000000), 0xb95dc78472bf3398}, 0x14a00, 0x1, 0x80000001, 0x7, 0x5, 0x9, 0x5}, 0x0, 0xb, 0xffffffffffffffff, 0x8) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) perf_event_open$cgroup(&(0x7f0000000d40)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f0d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) 03:08:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 905.918302] audit: type=1400 audit(1548644935.754:289): avc: denied { create } for pid=23912 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:56 executing program 4: getpid() gettid() umount2(&(0x7f00000000c0)='./file0\x00', 0x9) prctl$PR_SET_PDEATHSIG(0x1, 0xf) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x1) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000040)='ppp0\x00') [ 906.143727] audit: type=1400 audit(1548644935.994:290): avc: denied { write } for pid=23912 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:56 executing program 2: r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) r1 = getpid() ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000000)=r1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x4}) fallocate(r0, 0x0, 0x2000000, 0x3) fallocate(r0, 0x8, 0x100000, 0x8000) 03:08:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0xdf, 0xffffffffffffffff) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x200, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20800100}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x5c, r2, 0x100, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x71}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x98a9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3aa}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x240408c0}, 0x4000000) 03:08:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:08:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce61e786cc0a3abc0a3911b42d2b314ca96d3ffff00"]) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_DIRENT(r0, &(0x7f0000000340)={0x58, 0xffffffffffffffda, 0x3, [{0x4, 0x6, 0x2d, 0x400, 'mime_typeposix_acl_access\x96ppp0trusted)ppp0&\'^'}]}, 0x58) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000440)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4800000}, 0xc, &(0x7f0000000400)={&(0x7f0000001480)={0xd8, r1, 0x4, 0x70bd25, 0x25dfdbfd, {}, [@TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffb}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x401}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}]}, @TIPC_NLA_NET={0x14, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x160}]}, @TIPC_NLA_SOCK={0x14, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0xffffffffffffffff}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x4}]}, 0xd8}, 0x1, 0x0, 0x0, 0x8000}, 0x10) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:08:56 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="6a9b2648d6a3821b6f7ef6cc1ef86b8c5ddfde110576d11a4c6415b204bb7220c361aa7605ade19de5c1dceb4c08ca91d2f5dbfac2d5d4caddc60f80773061e7c77b0bf13b890f19d4341c50a246a46ba754", 0x52, 0xfffffffffffffffb) keyctl$read(0xb, r1, &(0x7f0000000200)=""/53, 0x35) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0xec38ed91f9c7494a}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x891f, &(0x7f0000000000)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x4}) 03:08:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 03:08:57 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000400)='/dev/rtc0\x00', 0x10000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@mcast1, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000540)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000580)={@mcast1, r1}, 0x14) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) mount(&(0x7f0000000100)=@filename='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='xfs\x00', 0x50, &(0x7f00000003c0)='ppp\x00') sendmsg$nl_xfrm(r2, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000800)=@getpolicy={0x5c, 0x15, 0x9, 0x0, 0x0, {{@in=@multicast2, @in=@multicast1}}, [@policy_type={0xc}]}, 0x5c}}, 0xc095) r3 = accept(r2, &(0x7f0000000000)=@alg, &(0x7f0000000080)=0x80) getpeername$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) accept$packet(r3, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)=@bridge_getlink={0x6c, 0x12, 0x100, 0x70bd28, 0x25dfdbfe, {0x7, 0x0, 0x0, r4, 0x0, 0x11100}, [@IFLA_LINKINFO={0x18, 0x12, @ppp={{0x8, 0x1, 'ppp\x00'}, {0xc, 0x2, {0x8, 0x1, r2}}}}, @IFLA_PHYS_PORT_ID={0x1c, 0x22, "becbd9af4d095869cffd22345fa60c5b47fb42b8c974f8"}, @IFLA_LINK={0x8, 0x5, 0x200}, @IFLA_WEIGHT={0x8, 0xf, 0x80}, @IFLA_PHYS_PORT_ID={0x8, 0x22, "afd183"}]}, 0x6c}, 0x1, 0x0, 0x0, 0xc010}, 0x40080) [ 907.332605] audit_printk_skb: 9 callbacks suppressed [ 907.332618] audit: type=1400 audit(1548644937.184:294): avc: denied { create } for pid=23943 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 907.507841] audit: type=1400 audit(1548644937.354:295): avc: denied { write } for pid=23943 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 907.857562] audit: type=1400 audit(1548644937.704:296): avc: denied { create } for pid=23953 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 908.069065] audit: type=1400 audit(1548644937.924:297): avc: denied { write } for pid=23953 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 03:08:58 executing program 2: sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x8000009) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) r1 = dup(r0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xf, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="6f000000000000000fd8c32c0000000085001800470000000021070000000000e2c7f9f1c905f3a7257fc1434046367033488c734beb815100"], 0x0, 0x1f, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0xd}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000180)=""/148, 0x94}], 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x5}) sendmmsg(r2, &(0x7f00000092c0), 0x800010b, 0x18) fsync(r1) ioctl$int_in(r0, 0x5452, &(0x7f0000000580)=0xe2e) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet6(r0, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000000440)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x2007fff) sendfile(r1, r3, &(0x7f0000d83ff8), 0x8000fffffffe) 03:08:58 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x90, r0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x40c2, 0x0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="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", 0xc00) sendfile(r1, r2, 0x0, 0x10000) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000000)={0x0, r1, 0x2}, 0x14) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4008}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, r3, 0x600, 0x70bd27, 0x25dfdbfb, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4044000) [ 908.130546] audit: type=1400 audit(1548644937.974:298): avc: denied { create } for pid=23943 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 908.133333] audit: type=1400 audit(1548644937.984:299): avc: denied { write } for pid=23943 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 908.608178] audit: type=1400 audit(1548644938.454:300): avc: denied { create } for pid=23953 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 908.927043] audit: type=1400 audit(1548644938.774:301): avc: denied { create } for pid=23977 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 909.013465] audit: type=1400 audit(1548644938.864:302): avc: denied { create } for pid=23976 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 909.015778] audit: type=1400 audit(1548644938.864:303): avc: denied { write } for pid=23976 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:08:59 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) tkill(r0, 0x2a) ptrace$cont(0x18, r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)={'#! ', './file0', [{0x20, ',\''}, {0x20, '[\xb8H'}, {0x20, 'vboxnet0$bdev'}, {0x20, 'eth0'}], 0xa, "43faaa2cc53f042338244814c49f6059baa6692c8896a705ce4f708b459ca684728b46a22c5a515cd7753ae45a1b252468a7f3dc2e8640cea9405dff23f36f14bdeb64381b57668066f9291613a7e81c15a501eafbcc609332ac6059cb3cc861058ff36d8a3af90defffa0e25c005f23faf8d106aa6295054e5283a7a4b0463fe6662c90d24257517b7b3e166cc570d9549b312c5172d87b524feff2ea80"}, 0xc3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x2000000000084, 0x0, 0xca}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:08:59 executing program 1: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_GET_CHILD_SUBREAPER(0x25) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3a) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000000, 0xa7}) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xffefffffffffffff) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000140)={@rand_addr, @dev, 0x0}, &(0x7f0000000180)=0xc) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000001c0)={@empty, 0x0}, &(0x7f0000000200)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000280)={0x0, @remote, @initdev}, &(0x7f00000002c0)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000300)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000400)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000005c0)={{{@in=@remote, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@local}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000780)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000c80)={'team0\x00', 0x0}) getpeername$packet(r1, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000d00)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000ec0)={'ip6gre0\x00', 0x0}) getpeername$packet(r1, &(0x7f0000000f00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000f40)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000f80)={@multicast2, @broadcast, 0x0}, &(0x7f0000000fc0)=0xc) getpeername$packet(r1, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001100)=0x14) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000001140)={@loopback, 0x0}, &(0x7f0000001180)=0x14) getsockname$packet(r1, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001200)=0x14) accept4$packet(r1, &(0x7f0000001240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001280)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000012c0)={'nlmon0\x00', r11}) accept$packet(r1, &(0x7f0000001300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001340)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001440)={{{@in=@empty, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast1}}, &(0x7f0000001540)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001580)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@loopback}}, &(0x7f0000001680)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000016c0)={{{@in=@broadcast, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000017c0)=0xe8) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001840)=0xfffffffffffffe56) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000001880)={@loopback, @local, 0x0}, &(0x7f00000018c0)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f00000020c0)={&(0x7f0000000040), 0xc, &(0x7f0000002080)={&(0x7f0000001900)={0x750, r2, 0x200, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r3}, {0x1ec, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0xff}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r7}, {0x1b0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}, {0x8, 0x6, r8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r10}}}]}}, {{0x8, 0x1, r11}, {0x7c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x401}}, {0x8, 0x6, r12}}}]}}, {{0x8, 0x1, r13}, {0x74, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r14}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x8c}}}]}}, {{0x8, 0x1, r15}, {0x4}}, {{0x8, 0x1, r16}, {0x4}}, {{0x8, 0x1, r17}, {0x1a0, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1a15}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r19}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100000000}}}]}}, {{0x8, 0x1, r21}, {0x84, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r22}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r24}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}]}, 0x750}, 0x1, 0x0, 0x0, 0x480c0}, 0x40080) ptrace$cont(0x9, r0, 0x0, 0x0) 03:08:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 03:08:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f00000001c0)={0x800000000000, 0x4c2, 0x8, 0x8, 0xfc1}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = add_key(&(0x7f0000000200)='cifs.spnego\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000001480)="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", 0x1000, 0xfffffffffffffffa) r2 = request_key(&(0x7f0000000380)='dns_resolver\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000002480)='-eth0%-((useruser\x00', 0xfffffffffffffffa) keyctl$link(0x8, r1, r2) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000000c0)=0x0) syz_open_procfs(r3, &(0x7f0000000180)='net/ip_mr_cache\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:00 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0xffffff45, &(0x7f0000000180)={&(0x7f0000000200)=@delsa={0x3c, 0x11, 0x101, 0x0, 0x0, {@in=@multicast1, 0x0, 0xa}, [@srcaddr={0x14}]}, 0xfd0e}, 0x8}, 0x0) fcntl$setsig(r0, 0xa, 0x2a) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000001800)='/dev/rtc0\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001880)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000001980)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x40010000}, 0xc, &(0x7f0000001940)={&(0x7f00000018c0)={0x58, r2, 0x320, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xf}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @multicast2}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}]}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x20000040) 03:09:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) 03:09:02 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) ptrace$setopts(0x4206, r1, 0x0, 0x0) wait4(r1, 0x0, 0x80000000, 0x0) tkill(r1, 0x17) 03:09:02 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000000c0)={@broadcast, @loopback, @multicast1}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x3f, 0x0) flock(r0, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x3, 0x70, 0x7, 0x6, 0x1, 0x100000001, 0x0, 0x4df2bd3f, 0x14008, 0x3, 0xa00, 0x3, 0x10000, 0x2, 0x1f, 0x0, 0x8, 0x1, 0x2, 0x3, 0xfffffffffffffff8, 0xffff, 0xff, 0x3, 0x1ff, 0x6, 0x5, 0x80000001, 0x80, 0x0, 0x40, 0x80, 0x5, 0x8, 0x488, 0xdc2a, 0x3, 0x7f, 0x0, 0x25fe5960, 0x4, @perf_bp={&(0x7f0000000000), 0x4}, 0xa2, 0x9, 0x5, 0x6, 0x7, 0x98}, r1, 0x6, 0xffffffffffffffff, 0x4) ioctl$SNDRV_TIMER_IOCTL_SELECT(0xffffffffffffffff, 0x40345410, 0x0) 03:09:02 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 03:09:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) 03:09:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet6_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000006c0)=0x200, 0x20) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000100)=0x0) getpgid(r1) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) r2 = socket(0x3, 0x0, 0x4750) sendto$inet6(r2, &(0x7f0000000280)="9af19da8b89acdaf463568e804fd13c239dce1d30cde983bad1e48c645f8c03d01135eeb8e280ce4353414acf15c9a055be99e6b93357a367509f580734207806d17d62959775a345f401089316a815567a9aa618f2ca737359a65b15853b0d613f456e9b4d07e8ea329a1f1934f7cce9a0a284934e3d0d5a2a11058ad3f6505a3efad939861707a6a91f85f67d3a135dd1c6824e5116f0a76f603a44667cf45fc84775725abd37a02df", 0xaa, 0x8000, 0x0, 0x0) getpeername$packet(r2, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000040)=@nfc, 0x80, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0xd400}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r0, &(0x7f0000002300)=ANY=[@ANYRES64], 0x1000001bd) 03:09:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x80, 0x43) ioctl$BLKROGET(r1, 0x125e, &(0x7f0000000180)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:03 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={@loopback, @multicast2, 0x0}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'nr0\x00', r1}) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 03:09:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 03:09:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64643d303030303030303030303030303030306cb21f614c57deec093fa07d4498d2303034303030302c757365725f69643dcd093fd7a1dbaf6da8ff4737fe54f9d1187770eb87428fac33e25e30d0608d3d46b8a3f0f5", @ANYRESDEC=0x0, @ANYBLOB="6f755ffd4c5a000000002801313c", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) sched_setaffinity(r1, 0x8, &(0x7f0000000180)=0x20) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10}, 0x10) 03:09:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 03:09:06 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x402200) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB="02070000020000000000000000000000c40554af387d42f159f77b8e00cee2d23ae2e36f0469cc4a7a5374c47608a2833c44a6dd973ee163c8c55e3e9892e4f6983f6dcac18f0d7b2173bc4a96ec3ab9320d034f0b40354e7cbf08b8c59b9e06d191b90ef241c96b5f30b743e318430ad8395b9dcf84759969d88e56e47580132caa0d5224f68ac1bc0f73ce3c1c64d7b7f86962dc9e76f4f88400e7b074641d2413dec525a67a848c4afcf2096a3368ff81d9821181144e471a"], 0x10}}, 0x0) 03:09:06 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) io_setup(0x9, &(0x7f0000000040)=0x0) write$binfmt_elf64(r1, &(0x7f0000001140)={{0x7f, 0x45, 0x4c, 0x46, 0x8787, 0x20, 0x5, 0xfffffffffffffff8, 0xfff, 0x3, 0x3e, 0x7f6d, 0x313, 0x40, 0x37a, 0x0, 0x7fffffff, 0x38, 0x1, 0x9, 0x3, 0x8}, [{0x3, 0x80000000, 0x1272035, 0x100, 0x967, 0x0, 0x2, 0x9aa}, {0x7, 0x9, 0xff, 0x10000, 0x1, 0x4, 0x1000}], "f1408dd25d8542618726ea3e2dbac78d74aefd12605f46e6af727cbda1388b95678d6e280e5bfc6e97156bd48ff2dacdf3897d929eb14e031f07aeb2f149cb258dd72af86a1b24217fb0bbb7afb37dcd9631c0c156f7a5ae8a0db65f71c78664e8bf2b1298d88cf58e5e7ae7678ef2c217bc073c885a931ea4587705cdc8a96fad807284182de3a758e6a11e9db07470708818eaba90623d5a2fa675c7d9a9ce51d376b369e2cc08c523a2043d21bc", [[], [], [], [], [], [], [], []]}, 0x95f) io_cancel(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x4, r0, &(0x7f0000000100)="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", 0x1000, 0x1, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000001100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r3 = socket(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) sendmmsg$unix(r3, &(0x7f0000006c00)=[{&(0x7f00000033c0)=@abs, 0x6e, &(0x7f00000035c0), 0x0, &(0x7f0000003ac0)=[@cred={0x20}, @cred={0x20}], 0x40}], 0x682, 0x0) 03:09:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="66443d513e1038d00dc07ced734c92b47ebb763bf7c5a8ca47f579b3a96992530d5244c0c749ab066d1e8700fe604e67a233615762f23a1384e0e1566ff24c8b0f5a9e9a437d60525b0e0bac309590a20459ba3b117e38f1dd3f7cc27021aa8e8e397936f855fb25e1d79debc0ba68e7a8538e9af57532fff9508ee67ea8c208af67c337f99cc3341d718761ca34f44476e67ab862cdf38efd36217ece1faacfc76286f6aa5163278a9d8b9cb4a20d6e4584218c8c5bdc2d4956438c0bf46e69db29dbda2824b8c778da2b8a040fbf8ff5d3bfc6e1f7f73ae819474ef24320078f901a0f05cd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d4068ad6aedede189bdd23a219a14ab1efcb5176a6ac4a85edb7a87978fadb66c04bf3fc55ea7e91e9419dd43277411b4983ab1dad8f0f0c402b1daaa04eef0b32cb8a6553cca3caba42729fc19a6ce65fbffc8d6e73fcdf69e75579dc0152daad24dbb9516d3073dc8c1655880fc547ccfbfe1ebbf3b8c23ee40f09f24fa1602e41db09444c5d807ae61d5dda32e2369d7b1b5cd", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:06 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000000c0)=0x3) r2 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x1050, r3, 0x1) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r3) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) ptrace$setsig(0x4203, r4, 0x3, &(0x7f0000000040)={0x3f, 0x3, 0x9}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40042409, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 03:09:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="747275737465642e7a4a905cabd0103a56e8192b00fcbd2c36b8227765eec0e3b404458ca8f0c1f898f09b32b853f8076347bdf8d57c54c2b0e43d916623388107ffde53c21d1c8aa73dc2c0d27f783e9cbdb6de9285de33149cd0a69a2c31ce2c6a35154b4cea4b2285fd2a51800650931dc2f0af8fad42e17441657ddd0ef7ae1c3e9e2afc071ccd378eadd40cfeab8dd26af3b10d05b3b9f99c9c28f99b66ae80dd423629769db4970970271130d88bca9f2adf4359b08c23084bf6"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:06 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0xfffffffffffffffd, 0xfffffffffffffffc) setsockopt$inet6_int(r1, 0x29, 0x8, &(0x7f0000000180)=0xffffffffffffffff, 0xc) getsockopt$inet6_buf(r1, 0x29, 0x6, &(0x7f0000c86000), &(0x7f0000000000)=0x284ea92c5e2cf055) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x100, 0x43) write$P9_RVERSION(r2, &(0x7f0000000100)={0x15, 0x65, 0xffff, 0xfe4c, 0x8, '9P2000.L'}, 0x15) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) 03:09:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) 03:09:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="000000000000aca20080"]) r1 = dup3(r0, r0, 0x80000) futimesat(r1, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={{}, {0x77359400}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x145) 03:09:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:07 executing program 4: fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000002c0)={0x10000, 0x3f, 0x1, 0x8, 0x7, 0x2, 0x100000001, 0x6, 0xfffffffffffffffc, 0x7fff, 0x5, 0x7}) r1 = socket$inet_udp(0x2, 0x2, 0x0) close(r1) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x8400, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r3, 0x3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/60, 0x3c) preadv(r2, &(0x7f0000000600), 0x0, 0x6) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast1}, 0x1c) epoll_wait(r2, &(0x7f0000000500)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0xcb3f) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r0, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2c0}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x2c, r5, 0xa00, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x20000004) sendto$inet6(r4, &(0x7f0000000440), 0x0, 0x20000004, 0x0, 0x0) recvfrom$inet6(r4, &(0x7f0000001840)=""/31, 0xfffffe0e, 0x0, &(0x7f0000001880), 0x1c) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000640)=ANY=[@ANYBLOB="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"]) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6, @in=@broadcast}}, {{@in6=@dev}, 0x0, @in6=@ipv4}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000000)={'lo\x00'}) getsockopt$IP6T_SO_GET_REVISION_TARGET(r3, 0x29, 0x45, &(0x7f0000000400)={'ah\x00'}, &(0x7f0000000480)=0x1e) sendto$inet6(0xffffffffffffffff, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) connect$inet(r1, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) 03:09:07 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000280)={{{@in, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@remote}}, &(0x7f00000001c0)=0xe8) fstat(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000180)='./file0\x00', r5, r6, 0xffe) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) 03:09:07 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000000), &(0x7f00000000c0)='.', 0x0, 0x3080, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4400, 0x0) accept4$unix(r0, &(0x7f0000000180), &(0x7f0000000100)=0x6e, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) mount(&(0x7f0000000080), &(0x7f0000187ff8)='.', 0x0, 0x5010, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') preadv(r1, &(0x7f0000000000)=[{&(0x7f00000022c0)=""/4096, 0x1000}], 0x1, 0x0) 03:09:08 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000180)=0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000004000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c7375626a5f747970653d28766d6e6574302c737562965aebfe16ef744c64650500af155eff69dfdb94e1c712170ca60986c5157f3e9f51adc12dc20df448e2cc7ef0aad4d1cf00204903340ec211f847b2d6b7cc06d4488bd3390ecf5bb65ef9c12631d62a4c886605360e65a29401fb6258cb", @ANYRESDEC=r1, @ANYBLOB=',func=FILE_MMAP,smackfsfloor=,uid>', @ANYRESDEC=r1, @ANYBLOB="100e7aff054458b031f25daef945e8d758e0563058b773b8df056bc9de254a8bb9991753bbb0986144aabbc61182edacec7e9e73b7eb27b8600b29afadd02957e71e1e3157a50b0bae1369035e4c11979b2f9b718530c6ff6fbc20d52ecc35a3188470d2f78832bd5ce20daa0700658c1131b8411486956afb9a9034ee52360a22e8a80f617a75603db1737de7094a18e4145cf7ea2288371c108842ed80da1a1605316130123c46c9193cba7824c4b43bd419efc4f930cc29f3e7463bc4c60ade"]) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) fremovexattr(r0, &(0x7f0000000200)=@known='trusted.overlay.opaque\x00') openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x92000, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x5c, 0x0, 0x2, {0x7, 0x1b}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="747275737465642e2b004f6f8b44d4e4a8744fb4a6f836936ec10e508d5f24367e9335080a227eb2d9d03a00000080000000008a8da5ffd8325c1cc7f7a01baf1dfebbb9dde9adf2c9092af6e7eb8f811da036ea123fdaaf9dd610d210064e579fc0222696a63f50c70b75fb0ab8a9a4e676713e7a230fb862785ef294cbe44e0350c662b5095cf9c2c6f575092cd802c59ad1d02e85bf02e90000000000000000000000"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:08 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff}, 0x10) [ 919.088985] audit_printk_skb: 36 callbacks suppressed [ 919.088996] audit: type=1400 audit(1548644948.944:316): avc: denied { create } for pid=24193 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 919.347050] audit: type=1400 audit(1548644949.194:317): avc: denied { write } for pid=24193 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 919.677399] audit: type=1400 audit(1548644949.524:318): avc: denied { create } for pid=24193 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:09 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x4e23, @broadcast}, {0x1, @link_local}, 0x14, {0x2, 0x4e24, @multicast2}, 'dummy0\x00'}) setsockopt$inet_udp_int(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000200), 0x4) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000480)={@remote, 0x0}, &(0x7f00000004c0)=0x14) bind$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x15, r2, 0x1, 0x7fffffff, 0x6, @broadcast}, 0x14) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000680)='/dev/full\x00', 0x181040, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000800)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f00000008c0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x24, r4, 0x704, 0x70bd26, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x3}}, ["", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x8004}, 0x40040) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000140)=@fragment={0x2f, 0x0, 0x1, 0x0, 0x0, 0x19, 0x67}, 0x8) pipe(&(0x7f0000000040)={0xffffffffffffffff}) inotify_add_watch(r5, &(0x7f00000000c0)='./file0/../file0\x00', 0x0) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$getregs(0xe, r6, 0x7, &(0x7f0000000380)=""/241) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000240)={@loopback, @multicast1}, &(0x7f0000000280)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) write$P9_RSTATu(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0], 0x8) rename(&(0x7f00000006c0)='.\x00', &(0x7f0000000740)='./file0\x00') r7 = geteuid() fstat(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r5, &(0x7f00000005c0)={0x90, 0xffffffffffffffff, 0x8, {0x3, 0x3, 0x18000000, 0x4, 0x1, 0x3f, {0x3, 0x8, 0x1, 0x4, 0x8, 0x5781, 0x1, 0x8, 0x8000, 0x8, 0x28d0, r7, r8, 0x0, 0xa55}}}, 0x90) 03:09:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001480), 0x1000) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) setsockopt$IP_VS_SO_SET_ADD(r1, 0x0, 0x482, &(0x7f0000000180)={0x3f, @local, 0x4e21, 0x4, 'nq\x00', 0x21, 0xb8, 0x1f}, 0x2c) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x8, 0x0, 0x10000000000000, 0x0, 0x1ffffffffffffd, 0xa6a, 0x0, 0x0, 0x20, 0x3, 0x0, 0x0, 0x0, 0x57af, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setrlimit(0x1000000000000007, &(0x7f0000000040)={0x5, 0x81}) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r1 = request_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='\x00', 0xfffffffffffffffd) keyctl$link(0x8, r0, r1) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x400001, 0x0) ioctl$RTC_PLL_GET(r2, 0x80207011, &(0x7f0000000300)) write$P9_RXATTRCREATE(r2, &(0x7f0000000200)={0x7, 0x21, 0x1}, 0x7) socketpair$unix(0x1, 0x1, 0x0, 0x0) keyctl$instantiate(0xc, r0, 0x0, 0x0, 0xfffffffffffffffe) r3 = fcntl$getown(r2, 0x9) ioprio_get$pid(0x3, r3) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000240)={0x0, @broadcast, @remote}, &(0x7f0000000280)=0xc) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) 03:09:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff}, 0x10) 03:09:10 executing program 2: timer_create(0x7, &(0x7f0000000040)={0x0, 0x34, 0x3, @tid=0xffffffffffffffff}, &(0x7f0000000080)=0x0) timer_delete(r0) futex(&(0x7f000000cffc)=0x100000000000004, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x4, 0x1, &(0x7f0000000000)={0x77359400}, &(0x7f000044b000), 0x0) 03:09:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) fchmod(r0, 0x100) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = request_key(&(0x7f00000000c0)='ceph\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\x00', 0xfffffffffffffff8) keyctl$get_keyring_id(0x0, r1, 0x8) [ 921.331597] audit: type=1400 audit(1548644951.174:319): avc: denied { create } for pid=24245 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 921.633461] audit: type=1400 audit(1548644951.484:320): avc: denied { write } for pid=24245 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 921.925389] audit: type=1400 audit(1548644951.774:321): avc: denied { create } for pid=24245 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:12 executing program 4: r0 = socket$inet6(0xa, 0x80003, 0x0) futex(&(0x7f0000000040)=0x4, 0xb, 0x2, &(0x7f00000000c0)={0x77359400}, &(0x7f0000000080), 0x0) futex(&(0x7f000000cffc), 0x800000000005, 0x0, &(0x7f0000000180), &(0x7f0000000040), 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)) setrlimit(0xf, &(0x7f0000001940)={0xdcfa, 0x81}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x10000, 0x0) ioctl$ASHMEM_GET_PROT_MASK(r1, 0x7706, &(0x7f0000000380)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'sit0\x00'}) prctl$PR_GET_SECCOMP(0x15) getsockopt$inet6_buf(r0, 0x29, 0x2e, &(0x7f0000000280)=""/216, &(0x7f00000001c0)=0xd8) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001680)='/selinux/policy\x00', 0x0, 0x0) openat$cgroup_procs(r2, &(0x7f00000016c0)='cgroup.procs\x00', 0x2, 0x0) request_key(&(0x7f0000001540)='cifs.spnego\x00', &(0x7f0000001740)={'syz', 0x0}, &(0x7f0000001780)='cgroup.procs\x00', 0x0) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0xce, 0x1, &(0x7f0000001480)=[{&(0x7f0000001400), 0x0, 0x1}], 0x8000, 0x0) 03:09:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff}, 0x10) 03:09:12 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @multicast2}, 0x10) socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x0, 0x300) socket$inet_tcp(0x2, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x220000, 0x0) bind$inet6(r2, &(0x7f0000000200)={0xa, 0xfffffffffffffffc, 0x8, @remote}, 0x1c) rt_sigpending(&(0x7f0000000300), 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f00000000c0)=0x6, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0xffffffffffffffff) r4 = creat(&(0x7f00000007c0)='./file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000140)={0xa0, 0x0, 0x0, {{0x0, 0x0, 0x0, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc18f}}, {0x0, 0x7}}}, 0xa0) sendto$inet(r0, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) shutdown(r0, 0x1) ioctl$EVIOCGKEY(r4, 0x80404518, &(0x7f0000000240)=""/7) 03:09:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) stat(&(0x7f0000001740)='./file0\x00', &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001800)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000001900)=0xe8) syz_mount_image$f2fs(&(0x7f00000000c0)='f2fs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x5, &(0x7f00000016c0)=[{&(0x7f0000000340)="5b206f5e10dadb5f10087e1c8a5a0358359048743dd9620c855bbcf48079be66a443842204995479a9a5b28f33c09d999ca6dedfe9a579e3431064ab009df523247b9c65f0ecda45c3912b54d4b39b5f9dd8b7fd739fa5dcacf4a62856c3c1821cacf93ea02ad1e9517ed266b67aa7af25b30f87b7a662ebbb33f424e2d567859a7bb6ca2314d1b1fb68fa24a9ad42075649cdc6fcc754ce3f", 0x99, 0xb1}, {&(0x7f0000001480)="52d82e6312c5064acd407f0d4878cb9a1fedac667629722f80959ecd91a91b6b12004fdd899b00914359186beb5fd193da195bb85fa8907071c48fed65b02090c169783a2a9076804dd906b073c2ff804294a68ae998b04cc79524b5ae3b25c660a0b4aab487de9eb628c58155f1ab8bf8fa28af045900dde8c1753ae627608086c86115c9c88d525061fb03b4b590eececa295c63ab06affd530778a17e1419ff9dc82c4eb30e0b567c8adfa37e5a148509099518663e92fdf12f260f0d0296d9489a8de3f22e59de6d66a5324de240e377d2", 0xd3, 0x800}, {&(0x7f0000001580)="4ae12f10b86e4dbac8b77548d9f3fd1532844c921bd27a40128d6ad852a71772b66cfd3e345d4819678ab9515a92d58b407a3bf8d9a130cd2434eb9cf00d914719bd73d553c8926bebf1fb1fad673c3fb4081b59e63610074001faf2250f3d666f3c253449e375557a269e05799d9c91b2ff82f1bf46287a2457d30ec29761abfc94a2516ff32c3e763ae5314ec48033", 0x90, 0x8000}, {&(0x7f00000001c0)="5b80143125e9d3d2e27b31c9ed6a21b0c787e2f895c1a97d69f11bdc8254c78e41f89a217327e9f7364c96c2eec01000aabfe1da16651aa4cb77074dcc101ae175cc8239cf615379fe9ec97395e4e4f5286ebcaf874b327f449d4b0b1622", 0x5e, 0x1}, {&(0x7f0000001640)="e6240bd6906662e811264fff1aa4ebd511b72ae6870eefa113c79d0bc7daf4da91f23857ffe9f70cbe5485d61e962c275bb3d15344b53ba7fcedf6137f607ab155960e5c2734377acb01b775b3be03a78738f63e70835d0b6ff456a725f0", 0x5e, 0x8000}], 0x4, &(0x7f0000001940)={[{@resuid={'resuid', 0x3d, r1}}, {@acl='acl'}, {@jqfmt_vfsold='jqfmt=vfsold'}], [{@euid_lt={'euid<', r2}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, 'fd'}}]}) 03:09:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f00003d303030303030303f003030b330303030303034303030302c757365bf5f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) fstatfs(r0, &(0x7f00000000c0)=""/6) 03:09:12 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) socket$inet6(0xa, 0x2, 0x0) pipe2(&(0x7f00000000c0), 0x0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r2, &(0x7f0000000340)={0x0, 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000480)=""/195, 0xc3}, 0x120) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$uhid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/uhid\x00', 0x0, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000580)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x5e, 0x200, 0x20, 0x9, 0x100000000, 0x0, "a7997af3c30ecc1bdf46ff39f73e750f10a874d774cf971ef03c944b49ad46ec0e9a6fecf3ad66307873cc1441ec52ea09d57b29ef48851b4af333b892ba700fe023282fca8f21cb83bc49f0b7681ecfa012bd95c3ff4cd50e2c4ebcc993"}, 0x176) socket$inet(0x2, 0x4000000000000001, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)) writev(r2, &(0x7f0000000180)=[{&(0x7f0000000040), 0x21c}], 0x8) [ 923.319902] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:09:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x1d}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) [ 923.422351] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 923.484603] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 923.544218] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 923.625349] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 923.625354] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 923.625364] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:09:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000180), &(0x7f00000001c0)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@dont_hash='dont_hash'}, {@smackfsdef={'smackfsdef', 0x3d, 'trusted.'}}]}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5, &(0x7f0000000200)='ppp0\x00', 0xffffffffffffffff}, 0x30) sched_setscheduler(r1, 0x2, &(0x7f0000000440)) [ 923.625369] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 923.898188] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) 03:09:13 executing program 4: socket(0xa41dbcb7fb138200, 0x0, 0x100000001) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000100)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, &(0x7f00000002c0)="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", 0x5ff, 0x0, 0x0, 0x0) [ 923.898195] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock [ 923.908058] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 923.908065] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock 03:09:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000004fc8)={0x0, 0x0, &(0x7f0000004000)=[{&(0x7f0000006000)="1b0000005200030f07fffd946fa283bc04eee6d87986c497271d85", 0x1b}], 0x1}, 0x0) 03:09:14 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='pids.events\x00', 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@empty, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in=@local}}, &(0x7f00000001c0)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2cdc3c71764e6f746d6f64653d30303030303030c03034303030302c757365725f7d62fde82c007f98f1419bb684c27a5fb4691e84ff9a417423bc667ff683dac9fa404128e3144b66f802f674194291f215a5a69a687c0c9a00f0ac4eb9319da2968a2de2e5a7463c69efe9bc5571663949d297361c92872c25dad360b0708a3afd43be32f19dd6529d5b5ab357b909757e3e3a12f6437060a27ba0913119557e6a2d37598593c4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',R']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x200000, 0x0) ioctl$BLKTRACESTOP(r2, 0x1275, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 923.908115] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 923.908121] F2FS-fs (loop5): Can't find valid F2FS filesystem in 1th superblock 03:09:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000003, &(0x7f0000000300)=0x1, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0xfffffffffffffd58) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080), 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007f9, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040), 0x4) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) close(r1) r2 = syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) r3 = memfd_create(&(0x7f0000000140)=',!\x00', 0x0) pwritev(r3, &(0x7f0000000400)=[{&(0x7f0000000340)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r2, 0x4c00, r3) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r1, 0x0) socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) read(r3, &(0x7f0000001440)=""/184, 0xb8) fcntl$setstatus(r2, 0x4, 0x42800) setxattr(&(0x7f00000001c0)='./bus\x00', &(0x7f0000000380)=@known='trusted.overlay.opaque\x00', &(0x7f00000003c0)='$!^\x00', 0x4, 0x1) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0x526987c9) read(r4, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendfile(r2, r3, 0x0, 0x80003) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000100)) getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) [ 923.908144] F2FS-fs (loop5): Magic Mismatch, valid(0xf2f52010) - read(0x0) [ 923.908149] F2FS-fs (loop5): Can't find valid F2FS filesystem in 2th superblock [ 924.770768] audit: type=1400 audit(1548644954.624:322): avc: denied { prog_load } for pid=24320 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 924.927739] audit: type=1400 audit(1548644954.774:323): avc: denied { prog_run } for pid=24320 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:09:15 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040), 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) close(r1) socket(0x200000000000011, 0xa, 0x0) io_setup(0x7, &(0x7f0000000100)=0x0) io_submit(r2, 0x200001a0, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000800000000001, 0x0, r1, 0x0, 0x12f}]) [ 925.146672] audit: type=1400 audit(1548644954.994:324): avc: denied { prog_load } for pid=24320 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:09:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000001940)={'filter\x00', 0xa6, "1aa2dd022989569b0a5b63b18c896913e702557757432239283e941ee42e41c53e38cbdd9ee490d101d937f76531a117a27a9c2df762fd00b03d791995480ac2729c1d114ae98c29fb2cd8638033fde27449c3caee169c81a4572a3e0ff4c54d87e22a2f760d61ef980135b8a4af5a575994fee46e9016543242c986126b448efa1eed450d0dfd9d67a1667edb44fb0ae5f42a4fdbaac0eb4d8b6db618fd657dc4ba6f881049"}, &(0x7f0000001a40)=0xca) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = getpgrp(0xffffffffffffffff) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x7, 0x2, 0x4, 0x2, 0x0, 0x9, 0x8500, 0x2, 0x4, 0x1, 0x3ff, 0xb4f, 0x4, 0x2, 0x2, 0x3, 0x5, 0x6, 0x800, 0xc6, 0x3, 0x40, 0x2d58, 0x0, 0x0, 0xffffffffffff0000, 0x87a5, 0x7, 0x7, 0x10001, 0x9, 0x9, 0x4000000, 0x200, 0x5, 0x8, 0x0, 0x10000, 0x2, @perf_config_ext={0x8000, 0xfffffffffffffffb}, 0x2003, 0x7, 0x1000, 0xd, 0x6, 0x7ff, 0xc104}, r2, 0x1, r3, 0x2) 03:09:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_WRITE(r0, &(0x7f00000000c0)={0x18, 0x0, 0x2, {0xffffffffffffffc0}}, 0x18) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x5, {0x7, 0x1b, 0x0, 0xfffffffffffffffd}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:15 executing program 3: r0 = syz_open_dev$evdev(&(0x7f0000000280)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = gettid() syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) timer_create(0x0, &(0x7f0000000300)={0x0, 0x12}, &(0x7f0000000340)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x401004000000016) ioctl$KDGKBSENT(r2, 0x4b48, 0x0) 03:09:15 executing program 1: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x600, 0x0, 0x0, 0xfffffffffffff000]}, 0x8d}, 0x1c) 03:09:15 executing program 4: pipe(&(0x7f0000000140)) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') 03:09:16 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) creat(&(0x7f0000000140)='./file0/file1\x00', 0x0) 03:09:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="66643d182ade3676011d5e94c0abb0f9ed8a90c53196b22367584fdadff15a53b0074f9356e3e47d0e7cc6975b125bd32b1f7df5fabf10968abfa032f09fda3ede732770c72463ac66810552fdd3d87f11eb4f67f1e0409e44247435009f67181a8206a9934a", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000180)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000001c0)=0x1c, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000200), 0x166) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x840, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_LSEEK(r2, &(0x7f0000000340)={0x18, 0x0, 0x1, {0x2}}, 0x18) 03:09:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', 0x3) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643daccbeffee441a56f2711e19fa39f4a5d6f2314bd9b2e4173ec6b04ba50435f1254dd0b9de901f346813593ac76f9bace702bc792ae046cbe67979d828bd2864594630817cd032b4619f81a3ac80a01279f9a5111d3abb0ff1159d8be39bf7a20f16846b196431a35884df19c45209126db8fb9f9adcfe1d62c1484ddd5d2202f4e48258157a7efe48ee2454cf73270fcd6c23ca0bd0622d345a893d22398c05553842fbdf5b0c6d8ffec3fce409c4bfca2a6680000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) mknod(&(0x7f00000000c0)='./file0/file0\x00', 0x400, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) write$P9_RREADLINK(r1, &(0x7f00000001c0)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffda, 0x2}, 0x10) 03:09:16 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x1, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x2f, 0x67}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 03:09:16 executing program 2: mknod$loop(&(0x7f0000000040)='./file1\x00', 0x6003, 0x1) r0 = open(&(0x7f0000000000)='./file1\x00', 0x0, 0x0) unshare(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, 0x0) 03:09:17 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x40000, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000180)) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2d3eca066a634374a6e4d87534ddc627faf1ab62f4d0338eb941e4f6e1120000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) sync_file_range(r0, 0x0, 0x1000, 0x2) r1 = accept4(0xffffffffffffff9c, &(0x7f0000000340)=@ax25={{0x3, @netrom}, [@rose, @default, @bcast, @rose, @default]}, &(0x7f00000000c0)=0x80, 0x800) recvfrom$unix(r1, &(0x7f00000003c0)=""/20, 0x14, 0x40, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x4) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x21000200}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x50, r2, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x1000}, @NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x60000000000000}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffff}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x800}, 0x4010) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 927.680682] audit: type=1400 audit(1548644957.534:325): avc: denied { prog_load } for pid=24395 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 927.875433] audit: type=1400 audit(1548644957.724:326): avc: denied { prog_run } for pid=24395 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 928.067271] audit: type=1400 audit(1548644957.914:327): avc: denied { prog_load } for pid=24395 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 928.265144] audit: type=1400 audit(1548644958.114:328): avc: denied { create } for pid=24411 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 928.267486] audit: type=1400 audit(1548644958.114:329): avc: denied { write } for pid=24411 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 928.667998] audit: type=1400 audit(1548644958.514:330): avc: denied { read } for pid=24411 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 928.802076] audit: type=1400 audit(1548644958.654:331): avc: denied { create } for pid=24411 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 INIT: Id "6" respawning too fast: disabled for 5 minutes 03:09:20 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000010}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x5c, r1, 0x0, 0x70bd2a, 0x2, {}, [@IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6erspan0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xee3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x9}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x24000000) write$selinux_create(r0, &(0x7f00000001c0)=@access={'system_u:object_r:auditd_etc_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x40}, 0x55) ioctl$KDSKBLED(r0, 0x4b65, 0x7ff) sendmsg$IPVS_CMD_DEL_SERVICE(r0, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000805}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0xd8, r1, 0x828, 0xfffffffffffffff7, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x13f000000}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x4}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x12, 0x8}}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@dev={0xac, 0x14, 0x14, 0x2b}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @empty}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x40}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x4004}, 0x1) ioctl$VT_DISALLOCATE(r0, 0x5608) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1d, &(0x7f0000000400)="f0995c419158153e4587bdf82c91391ff9ff38e10b549d4b92e7dd3b0eea1d9cea5d9c2d2c6b3653627f4beb17f1feb5c13294b6bc31813fc36fe7f246b8de1e02ea0202588002f225929977fb0a7c893e1134632b017ddc590c2ce4afb3af659ffd0bc7bb0dd672221db3075e5530723551009c62243a46462853894dd3d8afe86ecae429e3d92d74c9a17eabe87f3816542380bd8bb157877606d87f2802e755f63245b731281ebbcccfd6fe3db862152bb16091cbb0e1410151458e0bf45e339dc0", 0xc3) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000500), 0x4) sendfile(r0, r0, 0x0, 0x8) flock(r0, 0x0) ioctl$BLKIOOPT(r0, 0x1279, &(0x7f0000000540)) setsockopt$inet6_int(r0, 0x29, 0x7f, &(0x7f0000000580)=0x7, 0x4) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f00000005c0)={0x2, 0x800, {0x57, 0xfffffffffffffffc, 0x80000001, {0x1, 0xfffffffffffffffa}, {0x97, 0xcec}, @cond=[{0x65, 0x3, 0x7fffffff, 0x8000, 0x46d78003, 0x2}, {0x1ff, 0xd5ae, 0x3, 0x80, 0xffffffff, 0x1f51}]}, {0x53, 0x7f, 0x3, {0x2, 0xffffffffffffff33}, {0x1073, 0xa6f0}, @rumble={0xfffffffffffffff8, 0x4}}}) sendfile(r0, r0, &(0x7f0000000640), 0x1ec5) r2 = openat$cgroup_procs(r0, &(0x7f0000000680)='cgroup.threads\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f00000006c0)="17590ae794bd9dfe0821152ff4854674", 0x10) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000700)={0x35b, 0x5, 0xff}) setsockopt$inet6_int(r0, 0x29, 0x1, &(0x7f0000000740)=0x5, 0x4) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000780)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000007c0)={@local, @local}, &(0x7f0000000800)=0xc) clock_getres(0x2, &(0x7f0000000840)) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000a00)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000009c0)={&(0x7f00000008c0)={0xc8, r1, 0xdbc57443b29074f8, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wrr\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x20}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7fffffff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xffffffff}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0xc8}}, 0x4) r3 = getpid() r4 = syz_open_procfs(r3, &(0x7f0000000a40)='projid_map\x00') r5 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000a80)='/selinux/checkreqprot\x00', 0x42001, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000ac0)) fcntl$setlease(r4, 0x400, 0x2) ioctl$BLKBSZSET(r4, 0x40081271, &(0x7f0000000b00)=0x7) pipe2(&(0x7f0000000b40), 0x80000) 03:09:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) ptrace$getregset(0x4204, r1, 0x203, &(0x7f0000000200)={&(0x7f0000000400)=""/201, 0xc9}) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_ENTRIES(0xffffffffffffffff, 0x29, 0x41, &(0x7f00000008c0)={'nat\x00'}, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x600, 0x0) ioctl$TCGETA(r2, 0x5405, &(0x7f0000000100)) signalfd4(r2, &(0x7f0000000180)={0x9}, 0x8, 0x800) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000340)={&(0x7f0000000080), 0xc, &(0x7f0000000300)={&(0x7f00000003c0)={0x14, 0x42, 0x105}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/59, 0xfe63, 0x0) r4 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x11, r4, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r4) truncate(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000000)=""/127) write(r5, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0xfa) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r6}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="748575737467642ee8af"]) read$FUSE(r6, &(0x7f00000040c0), 0x1148) 03:09:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) readv(r0, &(0x7f0000000080)=[{&(0x7f0000001480)=""/223, 0xdf}, {&(0x7f0000000180)=""/92, 0x5c}, {&(0x7f0000001580)=""/255, 0xff}, {&(0x7f0000000380)=""/101, 0x65}], 0x4) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:20 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f00000000c0)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x1) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000001c0)={0x28, 0x2, 0x0, {0x2, 0x7, 0x3}}, 0x28) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:20 executing program 4: r0 = socket$inet6(0xa, 0x2100000400000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x2}, {{@in=@multicast1, 0x0, 0x2b}, 0x0, @in6=@loopback}}, 0xe8) r1 = geteuid() lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000000)='./file0\x00', r1, r2) 03:09:20 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x400302, 0x0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000040)=""/157) sendmsg$key(r0, &(0x7f0000f56000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000333f88)={0x2, 0x1, 0x0, 0x0, 0x2000000000000216, 0x0, 0x0, 0x0, [@sadb_ident={0x0, 0xb, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0xfffffffffffffe48}}, 0x0) 03:09:20 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) r1 = dup(r0) r2 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x10000) renameat(r1, &(0x7f0000000100)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') mkdirat(r0, &(0x7f00000001c0)='./file0\x00', 0x4) 03:09:20 executing program 4: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) fcntl$setpipe(r0, 0x407, 0x57b) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'os2.', 'lo\x00'}) poll(&(0x7f0000000100), 0x10f, 0x8000000000) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046208, 0x0) 03:09:20 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x1, 0x1}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) [ 930.612141] audit: type=1400 audit(1548644960.464:332): avc: denied { create } for pid=24425 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 930.947238] audit: type=1400 audit(1548644960.794:333): avc: denied { create } for pid=24440 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 931.105110] audit: type=1400 audit(1548644960.954:334): avc: denied { write } for pid=24440 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:21 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000080)={0x31, 0x4, 0x0, {0x2, 0x0, 0x9, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x31) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) r1 = dup(r0) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000180)) 03:09:21 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000b7a000)={0x8, 0x4, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x6, 0x0, 0x1, 0x2c}]}, 0x0, 0x82, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000004a00050400000000000000000a0000007e42242d767c3b59c7c27b8e57e6e51750a5de0ccbcb3fa6e42dda9b0f0550b89ad1c02a0bf3e77651af0d61e561b376814ee70ae8ae52c61d6e7e9c7ae6ef2fd81e044e43e2eaa2aa16b22e1b7d7e5ef949b0a7829b8722de9ebd79c931fe1c79633097782d9b0940f1b8dad8ee72569b8cdbf19d61b27e6e0741c4a5b6271197bd"], 0x14}}, 0x0) 03:09:21 executing program 4: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) pwritev(r0, &(0x7f0000003440)=[{&(0x7f0000000440)='I', 0x1}], 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x7, 0x200, 0xffffffff, 0x7, 0x0, 0x9, 0x1, 0x1, 0x1000, 0x5, 0xfc000000000000, 0x101, 0x7, 0x0, 0xa1, 0x80000001, 0x0, 0x100000001, 0x4, 0xfff, 0xef1a, 0x0, 0x100000001, 0x0, 0x9, 0x6, 0x5, 0x6, 0x5, 0x100000000, 0x6, 0x7f, 0xaf, 0x0, 0x8, 0x0, 0x0, 0xfffffffffffffffa, 0x4, @perf_config_ext={0x4b, 0x7}, 0x2000, 0x8, 0x8, 0x6, 0x8, 0xb2, 0x7}, r1, 0xe, r0, 0x8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@empty, @in6=@dev}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f0000000000)=0xe8) r2 = creat(&(0x7f0000000280)='./file1\x00', 0x101) fallocate(r0, 0x11, 0x0, 0x8001) ioctl$EVIOCSREP(r2, 0x40084503, &(0x7f00000002c0)=[0x8000, 0xa5]) lseek(r0, 0x0, 0x3) epoll_wait(r0, &(0x7f0000000040)=[{}, {}, {}], 0x3, 0x400) dup3(r0, r0, 0x0) [ 931.354031] audit: type=1400 audit(1548644961.204:335): avc: denied { create } for pid=24425 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 931.512945] audit: type=1400 audit(1548644961.364:336): avc: denied { read } for pid=24440 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 931.698125] audit: type=1400 audit(1548644961.544:337): avc: denied { create } for pid=24440 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 931.779134] audit: type=1400 audit(1548644961.574:338): avc: denied { write } for pid=24440 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 931.914035] audit: type=1400 audit(1548644961.764:339): avc: denied { prog_load } for pid=24472 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 931.941011] audit: type=1400 audit(1548644961.794:340): avc: denied { prog_load } for pid=24472 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 INIT: Id "3" respawning too fast: disabled for 5 minutes 03:09:22 executing program 3: mkdir(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='debugfs\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000100)=""/126, 0x7e) getdents64(r2, &(0x7f0000000500)=""/116, 0xffd5) 03:09:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = geteuid() prctl$PR_GET_TIMERSLACK(0x1e) setuid(r1) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x257, 0x0, 0x1, {0x7, 0x1b, 0x9, 0x0, 0x0, 0x73}}, 0xfd) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x80600, 0x0) getsockname$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) setsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000001480)={{{@in=@loopback, @in6=@remote, 0x4e24, 0x4, 0x4e24, 0x1, 0xa, 0xa0, 0x80, 0xaf, r3, r1}, {0xb, 0x80, 0x7, 0x4, 0x91, 0x80000000, 0xfffffffffffffff7, 0x1000}, {0x3, 0xfff, 0x2, 0x40}, 0xffffffffffff0ec8, 0x6e6bb7, 0x1, 0x1, 0x2}, {{@in=@rand_addr=0x7, 0x4d4, 0xff}, 0xa, @in=@broadcast, 0x34ff, 0x7, 0x0, 0x9, 0xfff, 0xfffffffffffffffa}}, 0xe8) ioctl$EVIOCSFF(r2, 0x40304580, &(0x7f0000000200)={0x52, 0xffffffff80000001, 0x8000, {0xa8, 0x3}, {0x9, 0x4}, @period={0x5a, 0xc6, 0x100000000, 0x101, 0x106bd623, {0x3, 0x0, 0x100000000, 0x101}, 0x3, &(0x7f00000001c0)=[0x1000, 0x7ff, 0x4]}}) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0x9, 0xf0, 0x3, 0x1ff}]}) 03:09:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=60000000000000000040000,\t\x00er_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0xfffffffffffffffe, 0x4, {0x7, 0x1c, 0x0, 0x84120, 0x2, 0x20, 0x2, 0x8001}}, 0x50) INIT: Id "5" respawning too fast: disabled for 5 minutes 03:09:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000240)='./file0\x00', 0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000000280)=""/85) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x5, 0x7, 0x1000}, 0x4) lsetxattr$security_selinux(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:netlabel_mgmt_exec_t:s0-\xdf\x7f\xd5S\x80T\x8ah]\xa3\xa5\x9f\x9a\xba\x85\xa9\xfbK\xdf\xdc\x12<\x893\xf8\xf2\x89\xa7\xe9\xa3\xf1\xa6f\xd0\xd5\x05\xa5Tw\x13Z\xb0x\x87\x89\f\x83\x8b\xfa\xfc)\x06\xc8\xf4 i\xb2\xb3\x97\x03\x82\x9c\x9a\xd3?\xa5e5\x93 \xf2\xfc[\xfdt\xfc\x84\xd2\xad\xf5\x9d\xe9\xbc\xc0\x97\xf5r\xb5\xcf\x91\x03^\x99y\f}\x8a6\xd8P\x84?\xe0\x9f\xdf\xf3\xdfE\xbb\xe6\xee01#x\xce\xba\"\xf7\x13\xdcG\v\xab7\xb4\x0e\xf6\xa0\xcd\xa7\x99\x90pY\t\v\xb3\x86>\x97Z\xd70mW\xf6l', 0xbe, 0x0) sendmsg$TIPC_NL_NODE_GET(r0, 0x0, 0x40000) chroot(0x0) ioctl$RTC_EPOCH_SET(r0, 0x4008700e, 0x7) mmap$perf(&(0x7f0000fec000/0x14000)=nil, 0x14000, 0x1000004, 0x10010, r0, 0x0) sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000640)={0x0, 0x0, 0x0}, 0x0) 03:09:22 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x80202, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r2, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x40, r3, 0x621, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x5}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}]}, 0x40}, 0x1, 0x0, 0x0, 0xc0}, 0x10) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) getegid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x20600) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) keyctl$unlink(0x9, 0x0, 0xfffffffffffffffd) ioctl$sock_SIOCADDDLCI(r1, 0x8980, &(0x7f0000000000)={'rose0\x00', 0xfff}) getitimer(0x0, 0x0) openat$selinux_status(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffff9c, 0xffffffffffffff9c) socket$inet_icmp_raw(0x2, 0x3, 0x1) fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) 03:09:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000017c0)=0x0) ioprio_get$pid(0x1, r0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000001780)={0x0, 0x1, 0x1ff, 0x8}) syz_mount_image$f2fs(&(0x7f0000000080)='f2fs\x00', &(0x7f0000000100)='./file0\x00', 0x3, 0x7, &(0x7f0000001640)=[{&(0x7f0000000180)="2a03d4bd8aed96a2d1aac3e2ed666004c67451e1921c65676ddb5b223aa015d28b256b388f7b881d8c171b6ce622d3ae1951451b9818ecf6d8c5993cee8bdb3af0c68f999499bf95", 0x48, 0x1ff}, {&(0x7f0000000380)="dc4fce0cc1dd94a740d370f2f2403c67c463a118f4052025f537009a91027783279f9adbcc896d2b70933425174b8d32c7cc83e0e349391153d0b56a6767497b8349344ecd0319198a4a24a4f76028a12a00aef725a85416", 0x58, 0x3f}, {&(0x7f0000001480)="dd6d4775140ab90d85af9eb0201ed05e02207a1fa3d2c0add910277b14e1f44333c12cd04cc1601c41046ce8caee655d4725588d0cf640d0eeae81233d85c742ed8313dfab4919ad855c9e30e9f0c705306c82fea049af11ef55707612f43b772baaaf46568f68d1c91d0b0353d8b63d63e40b6ca7aea0848cd937cb9abefec4d1d89fd05b7f27bba08e66cdc87e19f98d3fe9429ce34066e88bccb9228d6f", 0x9f, 0xbd8}, {&(0x7f0000000200)="7b8b", 0x2, 0x7}, {&(0x7f0000001540)="1ccd05cb6a8853ba774989f211aacd8edf7924a8bdbdecd77aa1117c2a3108082b20664086189a6a46e771277e82e7d519681b730a1f96514899ef633e4d36df1f2fd1cb0154cbdd7ae126e5cf71aa24b8142c99aeace0e8abbc4de383bcaa1f50", 0x61, 0x877}, {&(0x7f00000015c0)="132b6cfc9b4e7c91a1168f51e8f5f0f0fad62a04e7053429bd69770a252ae1ed2d5ec4a976bc76", 0x27, 0x3}, {&(0x7f0000001600)="669cc2d8bbac7f1aff6452b669be9498dcb36624", 0x14, 0x2}], 0x2000, &(0x7f0000001700)={[{@inline_xattr='inline_xattr'}, {@nobarrier='nobarrier'}, {@noflush_merge='noflush_merge'}, {@nobarrier='nobarrier'}], [{@appraise_type='appraise_type=imasig'}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@permit_directio='permit_directio'}, {@smackfsroot={'smackfsroot', 0x3d, 'rootmode'}}, {@hash='hash'}]}) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:22 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000340)={0x0, 0xffffffffffffffff, 0x0, 0x15, &(0x7f0000000200)='\xdbppp0[(trustedvmnet0\x00'}, 0x30) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x4, 0x0, 0xffffffffffffff81, 0xed6, 0x0, 0xfff, 0x8, 0x867d1dc4bc7ff299, 0x10000, 0x0, 0x280000000, 0x10000, 0xfff, 0xe46b, 0x7, 0x80000001, 0x1f, 0x800, 0xffff, 0x7ff, 0xb8, 0x3f, 0x80000000, 0xf99, 0x791c, 0x2, 0xb90, 0x1, 0xe8fb, 0x800, 0x3, 0x7, 0x7, 0xff, 0x8, 0x100, 0x0, 0x100, 0x6, @perf_bp={&(0x7f00000000c0), 0x9}, 0x10, 0x2, 0x7, 0x4, 0x6, 0x7, 0x3}, r0, 0x1, 0xffffffffffffffff, 0xb) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="531e9e63c0accec448547f12a7361157b0cc29d1ba5b0ee9aea61074b2336577efec1f8c295ab4462fc26a46dcb056a6866f0258a6bb4e1b27bcc8496781a774c33ce1121f9b236a1c16b7840ac750a65ddb908c88591ded644245c4a5587ad3340d76e838612e97fec035ac1f28778ba1fd039de4b9691403d5d1cd244cacf68c49aac0550c7bd41fa5c65ae03cd813a61e1dafdaf872a2deb40aac420608ac79a93e890289814edb65741532f7caa6fd8ddf1a5f0f840d5e122bad3a4a045a1f6e8d3f725d339aa14dc719c1c7ea483180f4997753979577", @ANYRESDEC=0x0, @ANYBLOB=',@']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) prctl$PR_GET_TSC(0x19, &(0x7f0000000380)) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 932.822929] audit: type=1400 audit(1548644962.674:341): avc: denied { mac_admin } for pid=24485 comm="syz-executor2" capability=33 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:09:22 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x20) open$dir(&(0x7f00000001c0)='./file0\x00', 0xfffffffffffffffd, 0x81) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:22 executing program 2: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) getitimer(0x0, &(0x7f0000000100)) setitimer(0x0, &(0x7f00003f8000)={{}, {0x0, r0/1000+30000}}, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{r1, r2/1000+30000}}) 03:09:23 executing program 3: r0 = socket$netlink(0x10, 0x3, 0xf) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x0) memfd_create(0x0, 0x200000000002) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) sendfile(r0, r1, &(0x7f0000000000), 0x6) sendfile(r1, r2, 0x0, 0x2000006) 03:09:23 executing program 1: socket$key(0xf, 0x3, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:23 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="66643da0fe982473b4440b63036289fc3b36eb430cf5a07f0b1a2212849d1c0495234173370f9e782713b98d534f55388023319c0e6570755186f10feabe2bf70fa5ada5b65a4d9f452564be421edad7a0cfd019d9c394624587c6f23ba1ee8b559a7ef63a9fe2192087fb76fcb5d9dd", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:23 executing program 4: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f000000b000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{0xa, 0x0, 0xfffffffffffffffe, @ipv4={[], [], @local}}, {0xa, 0x0, 0x0, @empty, 0x3f}}, 0x5c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_SET_SPECULATION_CTRL(0x35, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, &(0x7f0000001fde), 0x4) 03:09:23 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/create\x00', 0x2, 0x0) r1 = dup(0xffffffffffffffff) ioctl$VT_GETSTATE(r1, 0x5603, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000102000000000020009004000000000412d1fbc15000003000600000000190200ee00e0000054d81458020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x400) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000040)) ioctl$TCFLSH(0xffffffffffffffff, 0x540b, 0x0) getsockopt(r0, 0x20, 0x0, &(0x7f0000000000)=""/1, &(0x7f0000000140)=0x1) exit(0x310a) timer_create(0x9, 0x0, &(0x7f0000000300)) 03:09:23 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000001000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) syz_open_dev$binder(0x0, 0x0, 0x2) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x24080, 0x88) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0x1, &(0x7f0000000280)='\x00', 0xffffffffffffffff}, 0x30) r3 = getpgid(r2) capset(&(0x7f0000000600)={0x39980732, r3}, &(0x7f0000000640)={0x708000, 0x81, 0x5b, 0x1f, 0xaf57, 0x6}) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) gettid() sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="22ae1b179ca83213139df0a560aec0fefdca1065f628ab5361a9aec44b8c8a172ddfc83315cb861e79375ee3f02bfec935174b9b621a845c985b11f239b0afb0d7f9108013d5110d667ba02ca03899350d5f527b25fad799ab3700c3f54dc8ac0b8a662f2fa4e6f32884f41c83e1d2abffd31f4be07f8f2b95db133c8e754e8b00776ce4cebacdc30800549098b0ab52d805e5577021ebcd8dbd0d024adb773a8cf2efd12971274a53b449dced2550c89ea29ef9cc775e395e349045b9349423309e6ee7ff6202f677fa01847b2a3834838e028ce3d53283665d4f19435690894a29a18bfc4415c478a2e2a798238c231a", 0xf1}], 0x1}, 0x0) r4 = socket$inet(0x10, 0x3, 0x0) fcntl$setpipe(r1, 0x407, 0x8) gettid() r5 = add_key(&(0x7f0000000780)='asymmetric\x00', &(0x7f00000007c0)={'syz', 0x2}, &(0x7f0000000d00)="e61cbfd5ec88c05d66967628a16ead4810740e949a445ea0e396be6788d687bbe6909ad04dc53ef30fa184c30a49e0e96dae4459a37df412d318250f72da6b6a38339782f866232ad1a5745c5d3736c435199c9dc698154c5fbbd5e03e6b157d1ae19ebe4a7b67d9e087a078f0de4969e8fda4a8c4e6f2e7fb5745fbb6e33e69cb754184a264e973ab33a901bcce7fd5ff7f904b0f4d85d604bfe9427c223ee1e13156a3be08fd097d79407e43131a8ce81dc7d17a4cb8cac6fa04d418fcf17ac38c7811514807a2db14a88c98863683daf1ea29385bbe164569287ba80fb8232c8f7fd2439b0baec9fbeeed48d2f53efc857e7b", 0xf4, 0xffffffffffffffff) r6 = add_key$keyring(&(0x7f0000000c80)='keyring\x00', &(0x7f0000000500)={'syz', 0x1}, 0x0, 0x0, r5) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000a40), &(0x7f0000000900)=0xe6) r7 = add_key(&(0x7f0000000540)='trusted\x00', &(0x7f0000000580)={'syz', 0x1}, &(0x7f00000005c0)="06780c5e74569d0886fa4e5c809cbd", 0xf, 0xffffffffffffffff) keyctl$instantiate(0xc, r6, 0x0, 0xfffffffffffffe47, r7) ioctl$sock_ifreq(r4, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags=0x2}) prctl$PR_CAPBSET_DROP(0x18, 0x5) mkdir(&(0x7f0000000940)='./file0\x00', 0xc0) setsockopt$netlink_NETLINK_RX_RING(0xffffffffffffffff, 0x10e, 0x6, &(0x7f00000003c0)={0x100000001, 0xffffffff, 0xdd4, 0x4}, 0x10) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f00000000c0)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0xfffffffffffffffa, 0x3ff}, {0x93, 0xfffffffffffffffb}], r8}, 0x18, 0x0) pipe(&(0x7f00000006c0)) socket$inet(0x2, 0x4000000000000801, 0x0) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/user\x00', 0x2, 0x0) 03:09:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) epoll_create1(0x80000) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="747275737404652e2b00"]) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000001680)) read$FUSE(r0, &(0x7f00000040c0), 0x1148) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getgid() lstat(&(0x7f0000000200)='./file0/file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$EVIOCRMFF(r1, 0x40044581, &(0x7f00000016c0)=0xf0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x1, &(0x7f0000001500)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xf000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0xa00}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x9}}, {@blksize={'blksize', 0x3d, 0x600}}, {@blksize={'blksize', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0x1000}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot', 0x3d, '_em1'}}, {@permit_directio='permit_directio'}, {@fowner_gt={'fowner>', r4}}]}}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:24 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030302230303030213030303030303034303030302c757365725f69643d31773f815f1a4b29f23ef60d669b9e258446dd7249e1abfc484122d7b3c82744676aa4a90c6050eb79c0ec58769ebe2c45d1fbb0c543182a2aa9badc42b61593cdedabe938c9d58508bfa0c5113c8994dbfbd6357aefb1deeac30282ff8011", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = syz_open_dev$mice(&(0x7f00000000c0)='/dev/input/mice\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x10000000}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000180)={'filter\x00', 0x4}, 0x68) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0xd, 0xffffffffffffffff, 0x2}, 0x3) 03:09:24 executing program 4: socket$inet6(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) creat(&(0x7f00000000c0)='./file1\x00', 0x34) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000100)=@v3, 0x18, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, [], 0x13}, 0x1}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1000000000}, {}, {0x4}, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0xffffffffffffffff, 0x32}, 0x0, @in6, 0x0, 0x0, 0xfffffffffffffffc, 0x5, 0xfffffffffffffffc, 0x5, 0x1000000000}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300fda70000000000000000000000"], 0x10}}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = epoll_create1(0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/udp\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) preadv(r3, &(0x7f00000017c0), 0x1fe, 0x400000000000) close(r2) syz_open_procfs(0x0, &(0x7f0000000100)='mounts\x00') epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) sendmmsg(r2, 0x0, 0x0, 0x8c0) truncate(&(0x7f00000002c0)='./file0\x00', 0x0) open(&(0x7f0000000180)='./file0\x00', 0x200000, 0x21) 03:09:24 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 935.084725] binder: BINDER_SET_CONTEXT_MGR already set [ 935.095339] binder: 24548:24552 ioctl 40046207 0 returned -16 03:09:25 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f00000000c0)=0x200) 03:09:25 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000180)='./file1\x00', 0x5, 0x4, &(0x7f0000001680)=[{&(0x7f0000001480)="22a286a10a55bd15a327f1ed23fc21ff2d08f8131718f0dc6f0810c28cf15e547899857e15ae096d52851e96f4c5370cf453768aa3caa08b74e7ad428955fb7826a019de777526a751eee512dce9d063f7982a9c19a2ca465a548d5543b94a1d8156478edb1274f62855fb49f32701113b4e9cfeb28e27334197d1fff033bb8e2b5dc1e26a5a61b440e7287b55309e9381176100d1d44b9a8c435731e870759f358256115bf432001afc170f3b8c392155c8f5d078013cd90c825d160d92f1826c6502b528c0b6c71fd61639594a22f450b76a21d175a351fb09fc64770fd00c19bf33", 0xe3}, {&(0x7f00000001c0)="83410873a6d50c3303f41988e8247bbdc39c4b3bf63630ad4c136a84a96142c75bfae3eda41a9e71beae5ed34be51caf5081b673c080dddbd50bcbe5c7f78caa9ae4cbe28705d5f52db1543b4e070577f9d3daff283b6e7e50b1c18f0dad801566b85cab68801643a4af01b9e85db7f0670d25957624b3", 0x77, 0x8f}, {&(0x7f0000001580)="dedb34c934dcad4e573488b72a5076f4406e57e6433016253cce83a800f7d57a1687b726f72f1ae8167ce9519b542300490351a68f485af522b8f9937cbdc56f59f7fb2b7c406683d8f9c9c36a0effadf94ba76e0ce91f6d0e101d617bcef3d8c13a30cb43dfe91224b5ae699f2f657f27af754198584deb5ab402ece2d25a24488d6a4ec719805bd2c400420e81df582f3e50b4c9acbffc2b3881f38cce871e1387c4fbe38ea74c0a3faf55a412080a74240d975ff6e127d3412bc1f6ce55782507be336045ee175edf", 0xca, 0x8}, {&(0x7f0000000340)="c3b6a68988d5763e47e121944fd06b6b0c19a5dec0a1af6a1446217e61f4885205d18e8b229ce4af04bece8c85a8dd8a094795a42cab60e8c3b027aee2bc8d57cf3a8942ce612c63053ef6", 0x4b, 0x68}], 0x2001000, &(0x7f0000001700)={[{@dots='dots'}, {@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfshat={'smackfshat', 0x3d, 'fuse\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x63, 0x35, 0x77, 0x31, 0x33, 0x33], 0x2d, [0x7b, 0x0, 0x61], 0x2d, [0x0, 0x0, 0x35, 0x37], 0x2d, [0x77, 0x38, 0x65, 0x65], 0x2d, [0x35, 0x63, 0x39, 0x30, 0x0, 0x62, 0x65, 0x3f]}}}, {@measure='measure'}]}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001780), 0x1000) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:25 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = epoll_create(0x4000c) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="000000ce37000056000006"], 0x10) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000100)=0x9) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000000)={0x4}) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f00000001c0)={'security\x00', 0x2, [{}, {}]}, 0x48) [ 935.905101] audit_printk_skb: 27 callbacks suppressed [ 935.905114] audit: type=1400 audit(1548644965.754:351): avc: denied { prog_load } for pid=24555 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:09:26 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() r3 = getgid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000001580)=[0xffffffffffffffff, 0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0x0]) setxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000015c0)={{}, {}, [{0x2, 0x4, r1}], {0x4, 0x7}, [{0x8, 0x4, r2}, {0x8, 0x6, r3}, {0x8, 0x0, r4}, {0x8, 0x2, r5}, {0x8, 0x7, r6}], {0x10, 0x4}, {0x20, 0x5}}, 0x54, 0x2) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:26 executing program 2: socketpair$unix(0x1, 0x10000000000003, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e20}, 0x7a8f93509df46093) 03:09:26 executing program 4: socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 03:09:26 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) r0 = socket$inet(0x2, 0x800007, 0x7fff) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(0xffffffffffffffff, 0x0, 0x3a0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x3, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000140), 0x0, 0x20000800, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000300)=""/173) bind$inet(0xffffffffffffffff, &(0x7f0000deb000)={0x2, 0x0, @multicast1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe2(0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x1) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000600)={0x95, 0x4, 0x6, 0x0, 0x0, [{r1, 0x0, 0x3}, {r1}, {r0, 0x0, 0x2}, {r0}, {r2, 0x0, 0x5}, {r0, 0x0, 0x80}]}) connect$unix(0xffffffffffffffff, &(0x7f0000000280)=@file={0x1, './file1\x00'}, 0x6e) clone(0x818000, 0x0, 0xfffffffffffffffe, &(0x7f00000000c0), 0xffffffffffffffff) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000240)) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0xffffffffffffffff, 0x31, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f0000000500)="8858c14168879e30fa1a922084aeaf51d8d68d7e20d97b2f12fe5acb4daec641d3fd8b804215ec67f5728a219affb7d0ffdc2193d8346ddfeaba9a715ca0220699d067806a058c0bd1f9a00f8d3ce678db718c4a91d7d1454ca9416fe210fb79b96f1b7ec4feaf4137dc3449b0f19decc7432d129a8f77d0f2a4386425f039c1c6cfb2404f1df50233fa31db3248bd4a84fa1689f330376d2abbab63dfba09d29b330195e02aaa377a8aec8019c3f18c6ddd85d3", 0xb4, 0x40880, &(0x7f00000005c0)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x14}}, 0x10) fcntl$getownex(r3, 0x10, &(0x7f00000004c0)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket(0x2000000002, 0x20000000003, 0x0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) recvfrom(r4, &(0x7f0000000180)=""/184, 0xfffffe4c, 0x10100, 0x0, 0xfffffffffffffe75) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r5 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x2) setsockopt$inet_tcp_buf(r5, 0x6, 0x1a, &(0x7f0000000040)="20235eab4dee8517be236407969695b83bb36723c6cc12e4b462cd3e2f0b328574b9da3ed53df12f7a5a507c5e8caf244fe771f7bd615187d72b2cb82a8ab44946e7641b4eaeee984e1ea7452aa6", 0x4e) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000480)={0x30, 0x5, 0x0, {0x0, 0x6, 0xffffffff, 0x5}}, 0x30) read$FUSE(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) 03:09:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='\x00']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:28 executing program 3: sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) 03:09:28 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f00000015c0)=0x0, &(0x7f0000001600)=0x0, &(0x7f0000001640)) mount$fuse(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x80000, &(0x7f00000017c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@fsmagic={'fsmagic', 0x3d, 0x6a}}, {@fowner_gt={'fowner>', r2}}, {@appraise='appraise'}, {@smackfsdef={'smackfsdef', 0x3d, 'rootmode'}}, {@uid_gt={'uid>', r3}}, {@fowner_lt={'fowner<', r3}}, {@pcr={'pcr', 0x3d, 0x3a}}, {@pcr={'pcr', 0x3d, 0x21}}]}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:28 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="0000b2bd8cca8fc72f069d52136d"]) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:28 executing program 4: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = inotify_init1(0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000200)='./file0\x00', 0x80000005) r2 = dup(r0) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x14) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000380)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000580)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@empty}}, &(0x7f0000000680)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000036c0)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@remote}}, &(0x7f00000037c0)=0xe8) recvmmsg(r2, &(0x7f000000b700)=[{{&(0x7f0000004a40)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000004dc0)=[{&(0x7f0000004ac0)=""/119, 0x77}, {&(0x7f0000004b40)=""/165, 0xa5}, {&(0x7f0000004c00)=""/66, 0x42}, {&(0x7f0000004c80)=""/87, 0x57}, {&(0x7f0000004d00)=""/70, 0x46}, {&(0x7f0000004d80)=""/25, 0x19}], 0x6, &(0x7f0000004e40)=""/238, 0xee}, 0x5e7}, {{&(0x7f0000004f40)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000005140)=[{&(0x7f0000004fc0)=""/212, 0xd4}, {&(0x7f00000050c0)=""/42, 0x2a}, {&(0x7f0000005100)=""/31, 0x1f}], 0x3, &(0x7f0000005180)=""/24, 0x18}, 0x48f0ecaa}, {{&(0x7f00000051c0)=@l2, 0x80, &(0x7f0000007300)=[{&(0x7f0000005240)}, {&(0x7f0000005280)=""/109, 0x6d}, {&(0x7f0000005300)=""/4096, 0x1000}, {&(0x7f0000006300)=""/4096, 0x1000}], 0x4, &(0x7f0000007340)=""/227, 0xe3}, 0x400}, {{&(0x7f0000007440)=@nfc_llcp, 0x80, &(0x7f0000009700)=[{&(0x7f00000074c0)=""/48, 0x30}, {&(0x7f0000007500)=""/180, 0xb4}, {&(0x7f00000075c0)=""/82, 0x52}, {&(0x7f0000007640)=""/173, 0xad}, {&(0x7f0000007700)=""/4096, 0x1000}, {&(0x7f0000008700)=""/4096, 0x1000}], 0x6, &(0x7f0000009780)=""/242, 0xf2}, 0x1a2f}, {{&(0x7f0000009880)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000009d80)=[{&(0x7f0000009900)=""/251, 0xfb}, {&(0x7f0000009a00)=""/36, 0x24}, {&(0x7f0000009a40)=""/252, 0xfc}, {&(0x7f0000009b40)=""/145, 0x91}, {&(0x7f0000009c00)=""/184, 0xb8}, {&(0x7f0000009cc0)=""/136, 0x88}], 0x6}, 0x8}, {{&(0x7f0000009e00)=@un=@abs, 0x80, &(0x7f000000a000)=[{&(0x7f0000009e80)=""/5, 0x5}, {&(0x7f0000009ec0)=""/153, 0x99}, {&(0x7f0000009f80)=""/26, 0x1a}, {&(0x7f0000009fc0)=""/23, 0x17}], 0x4}, 0x4}, {{0x0, 0x0, &(0x7f000000a080)=[{&(0x7f000000a040)=""/37, 0x25}], 0x1}, 0x7}, {{&(0x7f000000a0c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f000000b380)=[{&(0x7f000000a140)=""/160, 0xa0}, {&(0x7f000000a200)=""/4096, 0x1000}, {&(0x7f000000b200)=""/15, 0xf}, {&(0x7f000000b240)=""/243, 0xf3}, {&(0x7f000000b340)}], 0x5, &(0x7f000000b400)=""/109, 0x6d}, 0x3}, {{&(0x7f000000b480)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f000000b6c0)=[{&(0x7f000000b500)=""/174, 0xae}, {&(0x7f000000b5c0)=""/251, 0xfb}], 0x2}}], 0x9, 0x100, &(0x7f000000b940)={0x77359400}) ioctl$UI_BEGIN_FF_ERASE(r2, 0xc00c55ca, &(0x7f00000003c0)={0x2, 0x5, 0x2}) getpeername$packet(r2, &(0x7f000000b980)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f000000b9c0)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f000000bb80)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f000000bb40)={&(0x7f000000ba00)={0x118, r3, 0xb00, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r6}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x845}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}]}}]}, 0x118}}, 0x0) ioctl$TIOCCONS(r2, 0x541d) io_setup(0x5, &(0x7f0000000040)) ioctl$PPPIOCSCOMPRESS(r2, 0x4010744d) inotify_add_watch(r0, &(0x7f0000ac5000)='./file0\x00', 0xa400295c) write$nbd(r2, &(0x7f0000000080)={0x67446698, 0x0, 0x3, 0x0, 0x3, "d489ee1a777dc1de863c91d56d2131eb740dd3b39b415a68d7a617f691dfef3852ebc0270a714fe3cd0ac3aa54f57f167d38b080acfab2a9e386ac86d079d621dc181e3581beefeab8432d21bd6059956ebe200627ac0cb34c1b82c036be20439b049c884b31a7d4d213339c5dce74167893b41cfc5beea9db6d43999bee9617f706ed536df3dfbab9984647c65202ce4bdefa77c734c26ada3ae1e75f4e14d0b226462995f0c434f2b76ed3efa0178d7d1e0516e924142663ec14b8f7ea121d828cfeaa26819a707035a23b78dec0e4137f49ee14863abde3e3f7c900"}, 0xed) utime(&(0x7f0000000000)='./file0\x00', 0x0) io_setup(0x4, &(0x7f0000000500)) epoll_create(0x9) 03:09:28 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) 03:09:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x3, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000af5000)={0x1, &(0x7f00006dc000)=[{0x200006, 0x0, 0x0, 0xa1}]}, 0x10) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340)='/dev/zero\x00', 0x400, 0x0) getpeername$netlink(r2, &(0x7f0000000380), &(0x7f00000003c0)=0xc) sendto$inet(r1, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) read(r1, &(0x7f0000001100)=""/4096, 0x1000) sendto$inet(r1, &(0x7f0000001040)="c3401c344654f3c7d9fe1ba48c8e390002000000000000d65cffffff38e9dd18c58f6bd779650fc30f09000000ecf323c9b87010227a60d177faf6502ceab47e58114347b289546c65a5eb278de72b1989f64cc99412e36880d20c34d91051b22f6c8acc9d082b7bcdec844f667da0867d0c00000000000000000000000000000000", 0xffffffffffffff6c, 0x1, 0x0, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) recvmmsg(r1, &(0x7f0000007980)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000240)=""/62, 0x3e}], 0x1}}], 0x1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r3 = gettid() tkill(r3, 0x14) sendto$inet(r1, &(0x7f00000000c0)='K', 0x1, 0x0, 0x0, 0x0) [ 939.118804] audit: type=1400 audit(1548644968.974:352): avc: denied { create } for pid=24652 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 939.344772] audit: type=1400 audit(1548644969.194:353): avc: denied { write } for pid=24652 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000000c0)='cgroup.events\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f00000003c0)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000380)={&(0x7f0000000180), 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x30, r2, 0x401, 0x70bd27, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x366, @bearer=@l2={'ib', 0x3a, 'batadv0\x00'}}}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x44}, 0x4040000) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0xfffffffffffffd77) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000001480)='/selinux/policy\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f0000000040)={@dev}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000140)={@remote={0xfe, 0x80, [], 0xffffffffffffffff}}, 0x20) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f00000000c0)=0x0) syz_open_procfs(r2, &(0x7f0000000100)='attr/fscreate\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f0000000000)=[{&(0x7f0000000180)=""/131, 0x83}], 0x1, 0x0) 03:09:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = dup(r0) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000440)=0x7ff) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6664c7828e43afcb9dbea43b812e07fd3d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f80ff0300003d383a6589cd3e9b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r2, 0x400454d1, 0x0) write$FUSE_OPEN(r0, &(0x7f0000000200)={0x20, 0x0, 0x5, {0x0, 0x4}}, 0x20) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) perf_event_open(&(0x7f0000000180)={0x3, 0x70, 0x9, 0x0, 0x101, 0x3ff, 0x0, 0x5, 0xc0, 0x4, 0x6, 0x6, 0x2, 0x4, 0x157, 0xffffffffffffff4b, 0x7, 0x9, 0x36f, 0x6, 0x1762, 0x4, 0x9, 0x23, 0x9e, 0x2, 0x10001, 0x6, 0x8, 0xffffffff, 0x3, 0x1, 0x5, 0x80000000, 0x3ff, 0x3, 0x6, 0x10000, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000000c0), 0x8}, 0x1000, 0x3, 0x80000001, 0x6, 0x8, 0x1, 0x80000001}, 0xffffffffffffffff, 0xe, 0xffffffffffffff9c, 0x8) [ 939.870233] audit: type=1400 audit(1548644969.724:354): avc: denied { create } for pid=24652 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/udp\x00') getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000000), &(0x7f00000000c0)=0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000001, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x54ab30f6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0x10000000007, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket(0x200000000000011, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'ip6_vti0\x00', 0x0}) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000100)=0xb7) bind$packet(r1, &(0x7f0000000040)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @broadcast}, 0x14) sendmmsg(r1, &(0x7f0000000d00), 0x400004e, 0x0) [ 940.007753] audit: type=1400 audit(1548644969.854:355): avc: denied { read } for pid=24652 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:29 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) 03:09:30 executing program 4: r0 = socket(0x10, 0x3, 0x0) r1 = dup(r0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000000)={0x7fff, {{0x2, 0x1ff, @multicast2}}}, 0x43e) write(r1, &(0x7f00000000c0)="1b0000001e001f0fff07eaf9002304000a04f51108000100020100", 0x1b) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f00000001c0)={'bpq0\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}) lsetxattr$security_smack_entry(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.SMACK64\x00', &(0x7f0000000180)='posix_acl_access-(]vmnet0[+\x00', 0x1c, 0x1) write$P9_RRENAMEAT(r1, &(0x7f0000000200)={0x7, 0x4b, 0x1}, 0x7) [ 940.273196] audit: type=1400 audit(1548644970.124:356): avc: denied { create } for pid=24683 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:30 executing program 2: ioctl$SNDRV_TIMER_IOCTL_CONTINUE(0xffffffffffffffff, 0x54a2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000340)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) io_setup(0x40000100000003, &(0x7f0000000200)=0x0) r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r3 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/member\x00', 0x2, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x1, 0x11, r3, 0x0) openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RSTATu(r2, &(0x7f0000000c40)=ANY=[@ANYRES32], 0x4) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x377140be6b5ef4c7}]) [ 940.446808] audit: type=1400 audit(1548644970.294:357): avc: denied { write } for pid=24683 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@known='system.advise\x00') read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:30 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x10000, 0x0) readlinkat(r1, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000080)={'HL\x00'}, &(0x7f0000000100)=0x1e) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$SIOCGIFHWADDR(r3, 0x8927, &(0x7f00000001c0)) 03:09:30 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0xc, 0x4, 0xa) ioctl$sock_ifreq(r1, 0x4000089f3, &(0x7f0000000040)={'ip6tnl0\x00\x00\x00\x91\x00', @ifru_addrs=@in={0x2, 0x4e20}}) [ 941.040893] audit: type=1400 audit(1548644970.894:358): avc: denied { create } for pid=24683 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 941.080081] audit: type=1400 audit(1548644970.934:359): avc: denied { read } for pid=24683 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:31 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TIOCNOTTY(r1, 0x5422) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:31 executing program 2: socketpair$unix(0x1, 0x400000005, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x2, 0x0) preadv(0xffffffffffffffff, &(0x7f00000006c0)=[{&(0x7f00000005c0)=""/148, 0x386}], 0xed, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/snmp\x00') ioctl$TCSETA(r1, 0x5406, &(0x7f0000000200)={0x6706c28c, 0x8, 0x0, 0x80000000, 0x1b, 0x5, 0x9, 0x6, 0x10000, 0x8}) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000280)={'veth0_to_team\x00', 0x10001}) preadv(r3, &(0x7f0000000480), 0x10000000000001f5, 0x0) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="24000000110007031dfffd946f610500000000000500000000000000421ba3a20400ff7e280000001100ffffba16a0aa1c0900000000000012000000000000eff24d8238cfa47e23f7efbf54", 0x4c}], 0x1}, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) openat$null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0x2100, 0x0) socket$inet6(0xa, 0x0, 0x76a5) ioctl$UI_GET_VERSION(r1, 0x8004552d, &(0x7f0000000140)) 03:09:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:31 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000100)={&(0x7f0000000080)='./file0\x00', r0}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[]) read$FUSE(r1, &(0x7f0000000480), 0x1000) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000180)=r0) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 942.107062] netlink: 8 bytes leftover after parsing attributes in process `syz-executor2'. 03:09:32 executing program 4: r0 = creat(&(0x7f0000000280)='./bus\x00', 0x0) r1 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) read(r1, 0x0, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x2e, &(0x7f0000000000)={@remote, @remote, @loopback}, 0xc) 03:09:34 executing program 3: r0 = gettid() exit(0x4) capget(&(0x7f0000000000)={0x20080522, r0}, &(0x7f0000000040)) preadv(0xffffffffffffffff, &(0x7f0000002580)=[{&(0x7f0000000080)=""/4096, 0x1000}, {&(0x7f0000001080)=""/189, 0xbd}, {&(0x7f0000001140)=""/214, 0xd6}, {&(0x7f0000001240)=""/219, 0xdb}, {&(0x7f0000001340)=""/184, 0xb8}, {&(0x7f0000001400)=""/4096, 0x1000}, {&(0x7f0000002400)=""/11, 0xb}, {&(0x7f0000002440)=""/95, 0x5f}, {&(0x7f00000024c0)=""/174, 0xae}], 0x9, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000026c0)='/selinux/checkreqprot\x00', 0x4000, 0x0) write$UHID_INPUT2(r1, &(0x7f0000002700)={0xc, 0x17, "e38e26af9826a1f7940b0e4b84d96978a0e0d5e0507584"}, 0x1d) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$notify(r2, 0x402, 0x3) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000002680)='/dev/null\x00', 0x10b400, 0x0) r4 = dup(r3) write$P9_RWSTAT(r4, &(0x7f0000002640)={0x7, 0x7f, 0x2}, 0x7) 03:09:34 executing program 4: r0 = creat(0x0, 0x0) fallocate(r0, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @ipv4}}}, 0x108) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) r2 = open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x1000000000000001) fsetxattr$trusted_overlay_redirect(r2, &(0x7f0000000000)='trusted.overlay.redirect\x00', 0x0, 0xfffffffffffffff2, 0x0) socketpair(0x10, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mknod$loop(0x0, 0x0, 0xffffffffffffffff) r4 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$EVIOCGBITSW(0xffffffffffffffff, 0x80404525, &(0x7f0000000140)=""/6) r5 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x10, 0x9, 0x0, 0x0, 0x60, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r5, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r6, 0x0) ioctl$EVIOCRMFF(r4, 0x40044581, &(0x7f0000000480)=0x3) fremovexattr(r6, &(0x7f0000000100)=@random={'osx.', '+\x8b\x8a\x16\x11O\xdd\xdfk(\xc6\xcej\x1b\x80>oJ\x02u\x9b\x94a\xac'}) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x13024200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xc0, r7, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x46c5ea9e}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x800}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x10, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}]}]}, @TIPC_NLA_LINK={0x24, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_MEDIA={0x3c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x4000}, 0x40001) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f00000001c0)={0x60fc, 0x9, 0x2, 0x5cb0bc9a, 0x1f, 0xfffffffffffffffd}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r6) ioctl$PERF_EVENT_IOC_REFRESH(r5, 0x2402, 0x830) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) fchown(r6, 0x0, 0x0) r8 = memfd_create(&(0x7f0000000400)='+\x8b\x8a\x16\x11O\xdd\xdfk(\xc6\xcej\x1b\x80>oJ\x02u\x9b\x94a\xac', 0x0) write$binfmt_misc(r8, &(0x7f0000000540)=ANY=[@ANYRES32], 0xfffffda2) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r4, &(0x7f0000000180)='threaded\x00', 0x9) 03:09:34 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) prctl$PR_SET_SECUREBITS(0x1c, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGABS3F(0xffffffffffffffff, 0x8018457f, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 03:09:34 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) 03:09:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x40, 0x0) ioctl$EVIOCGSW(r1, 0x8040451b, &(0x7f0000000180)=""/84) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000001c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000200)={0x0, r1}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) lgetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.origin\x00', &(0x7f0000000180)=""/28, 0x1c) [ 944.587038] audit: type=1400 audit(1548644974.434:360): avc: denied { create } for pid=24763 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:34 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x400}}, {@default_permissions='default_permissions'}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x100000001}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 944.833820] audit: type=1400 audit(1548644974.674:361): avc: denied { write } for pid=24763 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 945.340858] audit: type=1400 audit(1548644975.164:362): avc: denied { read } for pid=24763 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:35 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000001480)=ANY=[@ANYBLOB="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"]) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x2100, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x20) 03:09:35 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRES16=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f0000002480), 0xfffffffffffffce0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 945.511284] audit: type=1400 audit(1548644975.364:363): avc: denied { create } for pid=24763 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 945.538820] audit: type=1400 audit(1548644975.394:364): avc: denied { write } for pid=24763 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:35 executing program 3: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) poll(&(0x7f0000000080)=[{r0, 0xc0}, {r0}], 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r2, 0x7, &(0x7f0000027000)={0x1}) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000840)=@security={'security\x00', 0xe, 0x4, 0x3b0, 0x3d0, 0x128, 0x270, 0x0, 0x0, 0x3d0, 0x3d0, 0x3d0, 0x3d0, 0x3d0, 0x4, &(0x7f00000006c0), {[{{@uncond, 0x0, 0xc8, 0x128, 0x0, {}, [@common=@unspec=@connmark={0x30, 'connmark\x00', 0x1, {0x7fffffff, 0x401}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x8, [0x8b, 0x8f3c, 0x93, 0x100000000, 0x5, 0x2], 0x1, 0x87e}, {0xfffffffffffffff7, [0x0, 0x8b41, 0xfffffffffffffffb, 0x5, 0x3, 0x4], 0x4, 0x1000}}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x9b, 0x1ff], 0x100000001, 0x9}, {0x302, [0x9, 0x0, 0xa2b, 0x28, 0x8, 0x800], 0x3ff, 0x6}}}}, {{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @remote, 0x10001, 0x7, [0x1d, 0x37, 0xe, 0x14, 0x3f, 0x15, 0xc, 0x23, 0x3f, 0x0, 0x0, 0x33, 0x3e, 0x28], 0x2, 0x3}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x410) open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="0000850000000000000008000000000000000000001c3add"], 0x18) sendfile(r3, r3, &(0x7f0000000140), 0x7fff) 03:09:35 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000100), 0x1c) r2 = dup2(r1, r0) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f0000000200)=""/12) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, 0x0, 0xcd) ptrace$setopts(0x4206, r3, 0x0, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x1c) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f0000000000)) fcntl$setstatus(r2, 0x4, 0x0) socket$key(0xf, 0x3, 0x2) sync_file_range(r1, 0x5, 0xb2b0, 0x4) waitid(0x1, r3, &(0x7f0000000080), 0x1000004, &(0x7f0000000140)) 03:09:35 executing program 2: openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/load\x00', 0x2, 0x0) getuid() pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) write$P9_RREAD(r0, &(0x7f00000002c0)={0x3d, 0x75, 0x2, {0x32, "447e5fc3c9873119174a0545f5a2466614d61c08972cc62eb3e317cee311b6ee82cfa9f0f2be4cfcfd65ee641f0adb273afb"}}, 0x3d) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000000040)) openat$uhid(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = epoll_create1(0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCGKEY(r3, 0x80404518, &(0x7f0000000440)=""/197) write(r3, &(0x7f0000000340), 0x10000014c) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(0xffffffffffffffff, 0x4004556e, 0x1c) pipe(&(0x7f0000000280)) sendmsg$FOU_CMD_DEL(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x7, &(0x7f0000000400)={0x0, 0x0}) pselect6(0x1e9, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7, 0x0, 0x0, 0x1000000000000}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f0000000080), 0x8}) fcntl$dupfd(r1, 0x0, r2) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$getflags(r3, 0x1) 03:09:36 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x400, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000080)='./file0\x00', r1}, 0x10) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="19"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:36 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001480)={0x0, r0, 0x0, 0x1}, 0x14) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) sendto$inet(r1, &(0x7f0000001580)="e293a5fbf99aa137b8fb91cc5d68499c13a9a482bbf83ccfcbc751bd826cd2b3a66c1cc5505792851e9651a662d7ecb8742fdb64c968e1ff6325e05279eff1d4bc42d4d69742372eeb4de1ec0b2b4fe1d55d1b643273f2090c2ea9c6fe7b0ba245c55a65949f5eaf9fbb78b5473e87374869a59c530108e0575947a8c17453", 0x7f, 0x20000000, &(0x7f0000001600)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000001540)=0x10, 0x4) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000001500)='cpuacct.usage_all\x00', 0x0, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r2, 0x0, 0x41, &(0x7f00000001c0)={'mangle\x00', 0x46, "45be203124a536f6512aaadb67f62644bab66e3438211e07ec08f0bd501b2dd707123d836104bd87aa347c0f115a5fa0f93a7445b9f66c6074c4c8dafb8cda0267a119528312"}, &(0x7f0000001640)=0x6a) mkdirat(r3, &(0x7f00000014c0)='./file0\x00', 0x0) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="df4a3d", @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64040030303030343030303030303030303030303034303030308f56d57d00390d003d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r4, &(0x7f00000040c0), 0x1148) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000180)={0x0, r3, 0xa, 0x1}, 0x14) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50, 0xfffffffffffffff5, 0x1, {0x7, 0x1b, 0x0, 0x3, 0x0, 0x0, 0xfffffffffffffffc}}, 0x50) read$FUSE(r4, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r4, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000001680)=0xff) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x4000, 0xc4) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000380)=@broute={'broute\x00', 0x20, 0x3, 0xbe8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x20001480], 0x0, &(0x7f0000000340), &(0x7f0000002140)=ANY=[@ANYBLOB="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"]}, 0xd13) 03:09:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="7434b3877a6651148bca3f762d7c9bac9372757374b0642e2b007a1bfe54177902000000b20afa45692ac4ec32c283b3db5ae72d93a773181cb8ab6f090e4acc80895ee563353fb56f9612c7535df9a4f1b4e6f7000088a7"]) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x280, 0x0) ioctl$TIOCSBRK(r1, 0x5427) read$FUSE(r0, &(0x7f00000040c0), 0x1148) fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x2) syz_open_dev$evdev(&(0x7f0000000200)='/dev/input/event#\x00', 0x9, 0x501000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) socket$inet_tcp(0x2, 0x1, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:37 executing program 3: socket$key(0xf, 0x3, 0x2) r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000180)) getsockopt$inet6_buf(r0, 0x29, 0x30, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0xfffffffffffffff9) 03:09:37 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x400, &(0x7f0000001480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}], [{@dont_appraise='dont_appraise'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'user_id'}}, {@appraise_type='appraise_type=imasig'}]}}) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:37 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="84643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:37 executing program 2: r0 = memfd_create(&(0x7f0000000340)='#em1#+\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r2, &(0x7f0000000080), 0x1c) r3 = dup2(r2, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() getrandom(&(0x7f0000000000)=""/115, 0x73, 0x1) setsockopt$inet6_group_source_req(r3, 0x29, 0x2f, &(0x7f0000000400)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @rand_addr="fe141aa0c70da72e5a221d606884ab03"}}}, 0x108) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) fcntl$setstatus(r3, 0x4, 0x42803) write$eventfd(r0, &(0x7f0000000080), 0x8) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) 03:09:38 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001500)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x1000, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = accept$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) fcntl$dupfd(r0, 0x406, r1) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) signalfd4(r0, &(0x7f00000000c0)={0x9}, 0x8, 0x80000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:38 executing program 3: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x4000, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='htcp\x00', 0x5) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RAUTH(r2, &(0x7f0000000180)={0xfffffffffffffe8d}, 0x14) ftruncate(r2, 0x0) 03:09:39 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x3c, &(0x7f0000311ffc)=0x1, 0x4) setsockopt$inet6_buf(r1, 0x29, 0x3e, &(0x7f00002cef88)="d84f7398", 0x4) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x2, 0x0) ioctl$BLKDISCARD(r2, 0x1277, &(0x7f0000000080)) sendto$inet6(r1, &(0x7f0000000840)="51e251578851f74182a74b89b27df427aeef44966d202e4138b5a18e75a0424e7fe93b0d32c7abba87b65f97aba1c26a06b6d94c4aefd8fdca10e744391062c8e602721c20051608d9aa6dacf61e1eb331a4daad402b9885599d56130f7149fb1111fa116e94324d585a0569fbd311dad54cb4e32ff7f02216844ef42eeb66c3d526c878d5135ad1c9262239339c18885e2a0a95854d6cde3dd2feeaa50216af6c5760923413af81199a65a6332b02ec7bbf79d557c033cbe032fdc44f66a5c59cc4a3c5d218f5896b359d1efd60baf98df6396567478f7b817ce6e11d59a7def452a0e1d0607f57f626a5b8d476636ef1ee76307524009ae49be4db0ab2c8ea0c5ebd1e80fed632155e14da1f7324d97bc61a3c1edc4431ee8a6caa2ed9f85cea5a2a9b263630c7d6fc35dda6002da571a2e51917e7c1019d8ce21a608147e408cc4c7c5f444fab931bda86d977d7c9ccefd881e5ef05b287f41eea526862885881c2cdc687dff02ba9b70a9b08734ac4d62c7f34465c34aa9e9f136c7f796d9eea41aa37f61830508338bb1f887089070567a1dd96cd700e7a098dabedb60f31acd17d487bc8be1a3101d2b5ac1715003793596c6daa93a27f4adb4d6fbea5669c24c206c944317ea18a2c762457f1bc945fec8f849641d44e7e2a24faeee28f3f266395fe18b0dce20c1f64e8896c8ff0e4a44a116fb32462471a0fcde143e551723d57339722765673b4163d66f473ac10f988cb25c89074fcb1bba20c41bddd9ca5cd2f106632f9884a47866d284b4efc6bb1aa74ed48d4a6535795f0873a99907ebc22be2337364cf9acc063e32f7d2ebdfad64d04aa405d2dbdee1128ab1e4761d2dd30885ad37dd168478f10789d172feef4c817a5cd372caade57f23300e45f47e001e3ea09364ab42ee9802477368b9910f4e24037c871cb8251568c792287a6f49fa61b7c2600accaa0e7b40c5912a9e100225c70441144ffa82927fa4802ed9ebb03eea8e945af5f4993f21a7f53baf7ec5bb6cc96b917dde82c18840c3500e9565f68f687b1c73d834c0d99d4acb002dc5682dbcdb1217a98f6c3ef8318b7fa93894e8a097b4511ba5c035e27c9fe8bfe7754741ac21bbc0303b81672e3117e5590fe2d92f912759b9937f64204ec5caa92e218daa5a3ef64617beb30cccb31016b13ed8d7bcabb03e176b1c9bda3bf1c1256ab74ab6f42ed9bafbbd0096263be1a7da1e1c88deec55a653d170e1e13c77dacaa60a37a6ba2383e661ebc9f13dbaade2dd884c9951819fb4608e19e70cd2496ccfb12f24c71f496cfe9bc88fe1bbea1e9a24b1d4664fb0776aca6269b396779680e52f86877d9209988d12ccb137be01ab7496d00547a7d4849d365a18dbb55c429cde87d33c4b74ad2273cdfee88b5418866ef327f25e9cbcd5a64d97184339f7e4cb5f8de171d2779c0f68884ae835e398f982d57f428a5ed49f085628d3608986656ea04b721f828202e9342bd7d19dfa091e772aebf9718030167a8c029df7c58b7f400582bd95e5ad802050d8775ef373e8e2c5bf3525f907add3be426cd5a079c49abffe933e9ee213a3baf34f932d1299312691e1c53e6247ae0989ad64c70d51fad22856a8b6b28954e7d41189b11c5321789eec8670de9e8db0b0473ba2e02731e60be632697d61e052c18d4bcc6d1572fdf426f7b2fee6c1dee66c85c497b90facaf63b8ec5cde4a73400f9180bcfc0f81eca9580a7c81462a077f9034026bf72aa7c6de4b3c15d4a2dbd6fd7d87084aea9f25fb4bf5ec83eb56874a760533792dff2695407ccdd6a7375e0007230fd3f6501c152f1c1ff279b1d67cc95f2820762b7927659368e41657bdef2dd15b63498a93b787bdb26809d734aaf98b86fcf9fc643a34d03ebbe072820662d20f4774d66c5ae0a0adade5b8f6242a059b926221ee3d677487471c432b0d6d64dad030703475bb3ecac39b204a814f5ece5961621358e36f8a2cf7196c76959824bbb475a7cad8f57853fe05f59f341b5b4967904daf833d91ae9461ef10036f8", 0x5ad, 0x0, 0x0, 0x0) close(r1) 03:09:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2ce6"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000080)) accept$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000180)=0x1c) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000002480), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/mls\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:39 executing program 3: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x8880, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=@newae={0x40, 0x1e, 0x400, 0x0, 0x25dfdbfb, {{@in6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x4d2, 0xa, 0x33}, @in6=@local, 0x2b78}}, 0x40}, 0x1, 0x0, 0x0, 0x4000840}, 0x54) r1 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x0, 0x9, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) setxattr$security_smack_entry(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)='security.SMACK64IPIN\x00', &(0x7f0000000540)='^vboxnet1^\x00', 0xb, 0x1) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000840)='/selinux/checkreqprot\x00', 0xb41, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000880)={r1, &(0x7f0000000e00)="24df18166c0fc628688448574a5c90e4452a4e015be7e1e88ee92c6c7a016f86aa4f3ab18a23350b7112ad55311a0123b723e9a7a8c37f1bdf9445db5749d9ad784550ba4d24f9f5429a1f73e32933b11d5776c04fbbeb5ff660bc9c7413f527547686907e2474163e33505e5dd963e63171f4441be640fae2d65f40815d52a9118d090f104c0770ad5eabf1", 0x0, 0x1}, 0x20) unlink(&(0x7f0000000900)='./file0/file0\x00') r2 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r3 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r3, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000140)={0x4, 0x0, &(0x7f00000000c0)=[@enter_looper], 0x48, 0x0, &(0x7f0000000700)="2ba063fb309ec7fdbfb08e6e91baee7d7d4599fe14129a4d426834556ae420e087d59c0c7be7fcad1abb7e1f8f446f373f611ca1ee9c2231708e18a47bc68a2a79a0b48931f6ff6d"}) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000440)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x8, &(0x7f0000000200)=[@flat={0x73622a85}], &(0x7f0000000240)=[0x0]}}], 0xfffffffffffffe43, 0x0, &(0x7f00000003c0)}) syz_extract_tcp_res(&(0x7f0000000100), 0x81, 0x101) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0xe, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="01ffff00", @ANYRES64=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0xfffffffffffffeb3, 0x0, &(0x7f00000007c0)}) 03:09:39 executing program 5: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001480)={{{@in=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f0000000180)=0xe8) getgroups(0x7, &(0x7f00000001c0)=[0xee01, 0xee01, 0x0, 0xee00, 0x0, 0xee00, 0xee01]) r3 = geteuid() mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='fuse\x00', 0x205000, &(0x7f0000001580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xffffffffffffffb8}}, {@default_permissions='default_permissions'}], [{@fowner_lt={'fowner<', r3}}]}}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000340)='fuse\x00', 0x80000, &(0x7f0000001680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0xfffffffeffffffff}}, {@blksize={'blksize', 0x3d, 0x800}}], [{@appraise_type='appraise_type=imasig'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fuse\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'fowner<'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@fsuuid={'fsuuid', 0x3d, {[0x67, 0x77, 0x17b18698a5ca2fbd, 0x75, 0x77, 0x63, 0x64, 0x67], 0x2d, [0x77, 0x38, 0x35, 0x3b], 0x2d, [0x65, 0x0, 0x35, 0x37], 0x2d, [0x32, 0x73, 0x38], 0x2d, [0x3b, 0x0, 0x61, 0x31, 0x0, 0x39, 0x76, 0x63]}}}]}}) 03:09:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f00000050c0), 0xfffffedc) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:39 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = dup3(r0, r0, 0x80000) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000080)={0x6c, 0x101, 0x2, 0x80, 0x6, 0x6}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 949.913369] binder: 24900:24905 transaction failed 29189/-22, size 24-8 line 3013 [ 949.973078] binder: 24900:24905 unknown command 16776961 [ 950.011949] binder: 24900:24905 ioctl c0306201 200003c0 returned -22 03:09:39 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootm00000000000000040000Buser_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000002480), 0x1247) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:41 executing program 2: openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") r1 = memfd_create(&(0x7f0000000140)='\xff\x04\xffv\x9f`', 0x0) write$binfmt_misc(r1, &(0x7f0000000c40)=ANY=[@ANYRES32], 0xff67) fallocate(r1, 0x3, 0x0, 0x1) 03:09:41 executing program 4: r0 = socket(0x200000000000011, 0x4000000000080002, 0xdd86) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ip6tnl0\x00', 0x0}) bind$packet(r0, &(0x7f0000000040)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @dev}, 0x14) write(r0, 0x0, 0x0) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000080)=0x14) 03:09:41 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) socketpair(0x2, 0x0, 0x60a, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r2, 0x6, 0x14, &(0x7f0000000080), 0x4) rmdir(&(0x7f0000000140)='./file0\x00') ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1000000000000034) connect(r1, &(0x7f00000001c0)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e20, @rand_addr=0x6df}, 0x4, 0x0, 0x2, 0x8}}, 0x80) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x99}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r3, 0x800c6613, &(0x7f0000000180)={0x0, @aes128, 0x0, "2cbe65161a18cb75"}) 03:09:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="b0733df7d8f84170cf9109c984b7ea984e9d3e877501bbb07014243947340fd82f7c5e45f4ce7e9f80ea82f493fe6b53b84416811b2a070530d166c9ecf2754bac359e694e70afbf44e3cbba018f35affab8c0501a63c74a5db368ae2c9e63fb28448d26669a64d2c774a66158d443bcab"]) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='os2.vboznet1\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="73a171f29da60000000000000000"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x2) 03:09:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000200)=@random={'btrfs.', '{\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x18002, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0xfffffffffffffda4, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0xfffffffffffffffc}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:41 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_vs\x00') ioctl$UI_END_FF_ERASE(r1, 0x400c55cb, &(0x7f0000000180)={0x4, 0x6, 0x6}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000001480)={0x0, r0, 0xff, 0x4, 0x2, 0xf6}) ioctl$TCSETSF(r1, 0x5404, &(0x7f00000014c0)={0x1, 0x2, 0x8, 0x0, 0x6, 0x6, 0x9d, 0x2, 0x8, 0x9, 0x8001, 0x8001}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) ioctl$LOOP_SET_CAPACITY(r1, 0x4c07) setsockopt$packet_int(r1, 0x107, 0xe, &(0x7f0000000200)=0xfff, 0x4) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x4e20, @multicast2}, 0x10) setxattr$security_smack_entry(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='security.SMACK64IPIN\x00', &(0x7f00000003c0)='user_id', 0x7, 0x1) 03:09:41 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000200)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r1, &(0x7f0000001480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x14, r2, 0x200, 0x70bd2a, 0x25dfdbff, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='statm\x00') ioctl$BLKSECTGET(r3, 0x1267, &(0x7f0000000100)) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:41 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00\x84\xe0\xda\x82a\xbe\x18O\x17\x1b\\\x143\x06v\x9b=>\xc1\xd9\x06\x00\x05\xf7\xae\xce\xbeA,j5\xac\xf5\xf0&\xc5$\x951QC\x87\x9f\xe0};\xac\xb7k>0\xce\xcd~\xd766*\fo=Cg&[\x8b\xe2\xbd\xe9\x16\xc6\x1e\x97e]\xb0\xed\xe7I\x18\x96RS\x10\x8cyr\xb7\xcf', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x7c774aac) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x800003, 0x8012, r0, 0x0) lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0xfffffffffffffe2e, 0x0) 03:09:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=@known='com.apple.FinderInfo\x00') r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/keychord\x00', 0x4000, 0x0) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000001480)={0x3, 0x6, 0x0, [{0x80000000, 0x40, 0x5, 0x1000, 0x8, 0x7, 0x8}, {0x3, 0x3ff, 0x10001, 0x7f, 0x4, 0xff, 0x6}, {0x89b9, 0x100, 0x8, 0x8, 0x6, 0x0, 0x8000}, {0x0, 0x1000, 0x2, 0x3, 0x5, 0x2, 0x6}, {0x6, 0xff, 0x4, 0x10001, 0xb4, 0xff, 0x3}, {0x8000, 0x10001, 0x80, 0x3, 0x8, 0x3, 0xe12e}]}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:41 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = request_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000140)='bpf\x00', 0xffffffffffffffff) keyctl$describe(0x6, r2, &(0x7f0000000240)=""/28, 0x1c) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0/file0\x00', 0x0) sendto$unix(r0, &(0x7f00000001c0)="9440d9bd751209d076729eb74d7c0acb9547b0a3121950122ca326f7fad0c6620246dd72e053b7e41e9ff89c1de95c33141ebc4d24c582be4fa689b01f18f4f787e43f", 0x43, 0x24048045, &(0x7f0000000300)=@file={0x0, './file0\x00'}, 0x6e) mount$bpf(0x0, &(0x7f0000000280)='./file0/file0\x00', &(0x7f0000000400)='bpf\x00', 0x1, &(0x7f0000000700)={[{@mode={'mode'}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xaf76}}, {@mode={'mode', 0x3d, 0x2}}, {@mode={'mode', 0x3d, 0x8}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x100000000}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0x6}}], [{@obj_type={'obj_type'}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, &(0x7f0000000480)=ANY=[]) mount$bpf(0x20000000, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x2001001, 0x0) inotify_init() close(r0) mount$bpf(0x0, &(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000580)='bpf\x00', 0x80000, 0x0) fremovexattr(r1, &(0x7f0000000480)=@known='security.apparmor\x00') delete_module(&(0x7f0000000440)='mode', 0x800) mount$bpf(0x20000000, &(0x7f00000004c0)='./file0/file0\x00', 0x0, 0x5890, 0x0) syncfs(r1) mount$bpf(0x20000000, &(0x7f0000000380)='./file0\x00', 0x0, 0x5890, 0x0) 03:09:41 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYRES16, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="7f0000010000000000000000000000000000000000000000fe80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000"], 0x4}, 0x1, 0x0, 0x0, 0x2000000}, 0x0) fcntl$setlease(r0, 0x400, 0x3) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2000) syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0x80000) creat(&(0x7f00000001c0)='./file0\x00', 0x58) openat$cgroup_int(r1, &(0x7f0000000180)='cpuset.mem_exclusive\x00', 0x2, 0x0) ioctl$RNDADDTOENTCNT(r1, 0x40045201, &(0x7f0000000140)=0x1) [ 952.218968] audit: type=1400 audit(1548644982.074:365): avc: denied { create } for pid=24965 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:42 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000001600)=ANY=[@ANYBLOB="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"]) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x80000000000) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 952.507359] audit: type=1400 audit(1548644982.354:366): avc: denied { write } for pid=24965 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="74727573746505000000"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VT_GETSTATE(r1, 0x5603, &(0x7f00000001c0)={0x5, 0x4, 0x2}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:42 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x90000000}) 03:09:42 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) getpeername$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) [ 952.919198] audit: type=1400 audit(1548644982.774:367): avc: denied { create } for pid=24965 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grgup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:43 executing program 2: syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = memfd_create(&(0x7f0000000040)=']u]selinu^\xdbppp1#\x02', 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000080)=[@mss, @mss, @mss], 0x3) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x40000000000009) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f00000000c0)={'NETMAP\x00'}, &(0x7f0000000200)=0x1e) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x4e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getegid() r5 = request_key(&(0x7f00000001c0)='keyring\x00', &(0x7f0000002480)={'syz'}, &(0x7f00000024c0)='#\x02', 0xfffffffffffffffe) keyctl$revoke(0x3, r5) write$FUSE_INIT(r0, &(0x7f00000012c0)={0x50, 0xfffffffffff7fffe, 0x1, {0x7, 0x1b, 0x0, 0x3, 0x80, 0x98a, 0x1012, 0x10000000000008}}, 0x50) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000001340)='/selinux/enforce\x00', 0x40, 0x0) ioctl$GIO_FONT(r6, 0x4b60, &(0x7f00000002c0)=""/4096) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000180)=@generic={0x0, 0x3, 0x9}) ioctl$EXT4_IOC_GROUP_ADD(r4, 0x40286608, &(0x7f0000002380)={0xffffffff, 0x5, 0x0, 0x0, 0x2e}) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f00000023c0)={0xffffffffbfffdf01, 0x5, 0x4000}) write$apparmor_current(0xffffffffffffffff, 0x0, 0xffffffffffffffc2) perf_event_open(&(0x7f0000002500)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x4, 0x0, 0x0, 0x9, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = syz_open_procfs(r3, &(0x7f00000025c0)='net/ipx\x00') writev(r7, &(0x7f0000000080), 0x100000000000012e) read$FUSE(r2, &(0x7f0000002600), 0xffffffffffffff3a) fdatasync(r7) vmsplice(r2, &(0x7f0000004900)=[{&(0x7f0000004880)="eece61e595e849823d56fc2201defb89848006691910f33ba7563642c09f1a5c4411bab4c41cad5363819e97870af532d5991385e94f28c60f7a18aba064c3662f9f46e16a5e1178e9d25028bf", 0x4d}], 0x1, 0xe) ioctl$PIO_UNISCRNMAP(r7, 0x4b6a, &(0x7f0000001380)="2aa1dfd92c1c19df5cbfb7c67809eb5d920c7774de8ab5eab2d30000cd06aee6fa00a1516f52acd7556377be2046b94cb700ef53f860be2a855805e61ae7e4349ca21f8047e413a8ccd124b7b2b13a53e6d5dc98a2542f4e808ff6b60ba517733702000000000000b3492572bdd4ca2d5f6ce16ec520f22147750fa1048671bd3285c166cd874f1165e8b42ad161a7023003e6bec0b56874ef9104510a204ed9e9e7d870a076d3e575ea52c41672455410ac06760faa41ce2468d8da7efc23ea8edd158d230f0d5d1e09ccd7a8a44664295b843a6a4b1c4e3c") ioctl$TUNATTACHFILTER(r7, 0x401054d5, &(0x7f0000002440)={0x2, &(0x7f0000002400)=[{0x0, 0xfffffffffffffff8, 0x80000001, 0xf24}, {0x101, 0x996b, 0x9, 0x7}]}) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000002340)={0x0, 0x5268199108ee6820, 0x140000000, 0xfe84}) perf_event_open$cgroup(&(0x7f00000049c0)={0x0, 0x70, 0x7, 0x6, 0xffffffffffffffff, 0x20, 0x0, 0x9f, 0x8000, 0xa, 0xeb, 0x5, 0x2, 0x7f, 0x0, 0x0, 0x3, 0x4, 0x0, 0x7, 0x9, 0x6, 0xb7ec, 0x75d4, 0x2f, 0x0, 0x3ff, 0x0, 0x48, 0x3, 0x2, 0x7, 0x7fffffff, 0x2, 0x7, 0x3, 0x3, 0xfffffffffffffff7, 0x0, 0x1f, 0x4, @perf_config_ext={0x55, 0x5}, 0x400, 0x400, 0x0, 0x6, 0x1f, 0x7, 0x2d}, r2, 0xe, r2, 0x4) perf_event_open(&(0x7f0000004a80)={0x3, 0x70, 0xff, 0x4, 0x1a9c, 0x100000000, 0x0, 0xffffffff, 0x8055, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1ff, 0xb6, 0x9, 0x90, 0xfffffffffffffff8, 0x8, 0x8, 0x6, 0x7, 0x1, 0x0, 0x1, 0xffffffff, 0x1ff, 0x5d2, 0x7, 0x401, 0x291, 0x4, 0x0, 0xe19, 0xffffffff80000001, 0x1215ec8b, 0x0, 0x0, 0x6, 0x3, @perf_bp={0x0, 0x1}, 0x4, 0x4226, 0x5, 0x7, 0x4, 0x1, 0x95d5}, r3, 0xc, r0, 0x1) syz_open_dev$evdev(0xfffffffffffffffd, 0x0, 0x0) 03:09:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) accept4$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e, 0x80800) syz_mount_image$msdos(&(0x7f00000001c0)='msdos\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001d40)={[{@nodots='nodots'}, {@fat=@check_strict='check=strict'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@uid_lt={'uid<'}}]}) 03:09:43 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/load\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/fscreate\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000000c0)=0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000100)={0x400003, r1}) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000180)={@ipv4={[], [], @broadcast}, 0x800, 0x0, 0xff, 0x100000000000001}, 0x20) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@local, 0x800, 0x2, 0x0, 0x0, 0x0, 0xcd03, 0xffffffff}, 0x20) 03:09:43 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xa7, 0x4, 0x8, "3afaa2bd97e62c53a1e3424b716ea241", "8e16f247d3231218800eb56b1aec0b7d76b904c266d4025f7d1c104577ab9d304b7519a7d03809bd2d326bccd73262910d8471d2817d377fe7c8415f685f4dbcf4f7b2646c56fd3c737e77386ff391c56acba76320fad72b464d869185c0e6cfcce5da08d6a27d8c0dc409a9314d83aaac9a1556c37ba45c154fd8851e71a08f42c25cf27342e0eb5408407a56752e719019"}, 0xa7, 0x1) [ 953.998310] audit: type=1400 audit(1548644983.844:368): avc: denied { create } for pid=25014 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 954.337018] FAT-fs (loop3): Unrecognized mount option "uid<00000000000000000000" or missing value 03:09:44 executing program 4: clone(0x200, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file1\x00') mknod(&(0x7f0000f80000)='./file0\x00', 0x1042, 0x0) execve(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file1/file0\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) sendmsg$TIPC_CMD_DISABLE_BEARER(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00000000000000000000010000000000000002410000000000133a024000"]}}, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x841, 0x0) 03:09:44 executing program 3: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x4, 0x3, &(0x7f0000002000)=@framed={{0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f0000000140)='szller\x10\x00\x00\x00', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_attach_bpf(r1, 0x1, 0x34, &(0x7f0000009000)=r0, 0x4) 03:09:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="66643d18c11594e643c782dfa7b431ae30a1814dd28e2ab99876b141977f9c33ff5be08e274669d1f50c997d843382675459959cecde01f0b98f68bbf4e37c54d1c409544c6014fba280343a9030ce5e19cf5d307000987e579d6ea36c6a6ac33c0715be443f56f7f8d2bb021b28be318cd73e35f4fc3f756b0288f5d2afaf15bfd1ac5e6dcbb665fd0e0d501c96fc06ce73a005980ed375deb5c49aa2ee0dbb81ed9050cf55efe7f51d463175986757ca92eed26b932dcf9a381a64a42e03ba836087582abcdb2e6e80b027", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="747275735e7ea727aad59bb63e197d0c797405642e2b00"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000001480)={{{@in6, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0xe8) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001580)={{{@in=@multicast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@empty}}, &(0x7f00000003c0)=0xe8) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x100000, &(0x7f0000001680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100000001}}, {@allow_other='allow_other'}], [{@fsname={'fsname', 0x3d, 'rootmode'}}, {@subj_role={'subj_role', 0x3d, 'fd'}}, {@uid_gt={'uid>', r3}}, {@hash='hash'}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 954.733145] audit: type=1400 audit(1548644984.584:369): avc: denied { create } for pid=25014 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:44 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x844, 0x50000) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',up_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:44 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f75f93cd33dc9a212f18e6f746d6f64000000000000000330303030303051c630303030346f6a30", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x10000, 0x0) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0xc) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000001480)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="a24b00ff", @ANYRES16=r2, @ANYBLOB="200027bd7000fddbdf2501000000000000000741000000140018000000056574683a6261746164763000"], 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x40) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x200000000000000}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000000c0)=0x80000) [ 954.820927] audit: type=1400 audit(1548644984.674:370): avc: denied { getopt } for pid=25014 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 954.972538] audit: type=1400 audit(1548644984.824:371): avc: denied { ioctl } for pid=25014 comm="syz-executor2" path="socket:[61683]" dev="sockfs" ino=61683 ioctlcmd=0x8941 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:45 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) socket$inet(0x2, 0x3, 0x7f) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0xb98, 0xa03}) [ 955.285888] audit: type=1400 audit(1548644985.134:372): avc: denied { prog_load } for pid=25046 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:09:45 executing program 4: r0 = creat(0x0, 0x0) r1 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@loopback, 0x0, 0x2b}, 0x0, @in=@multicast2, 0x0, 0x0, 0x0, 0xa2f}}, 0xe8) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@mcast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000004c0)={{{@in=@local, @in6=@mcast1, 0x4e24, 0x0, 0x4e24, 0x3, 0xa, 0x80, 0xa0, 0x3e, 0x0, r3}, {0xbf3, 0x8000, 0x51652204, 0x1, 0x2, 0x4, 0x100, 0x401}, {0x6, 0x400, 0xcfda, 0x5}, 0x100, 0x6e6bb9, 0x1, 0x0, 0x3, 0x2}, {{@in=@rand_addr=0x1ff, 0x4d3, 0xff}, 0xa, @in6=@mcast2, 0x3505, 0x1, 0x3, 0xc198, 0x8b9, 0x3, 0x7fffffff}}, 0xe8) sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000240)={&(0x7f0000000040), 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xc8, r2, 0x420, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xff}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5c7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfb2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xffffffffffffffe5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x64f}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x86}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4513}]}]}, 0xc8}, 0x1, 0x0, 0x0, 0x80}, 0x0) connect$inet6(r1, &(0x7f0000000080), 0x1c) [ 955.483395] audit: type=1400 audit(1548644985.334:373): avc: denied { prog_run } for pid=25046 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:09:45 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030533030303034303030302c757365724769643d000014cab32da0cfcd0acf81f8921a46847b502cc4b4deaab8f78857d12274a4", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f0000001480), 0xfffffffffffffdad) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 955.672757] audit: type=1400 audit(1548644985.524:374): avc: denied { prog_load } for pid=25046 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:09:45 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) pipe(&(0x7f0000000080)) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:45 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/uts\x00') r1 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r0, r1) r2 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(0x0) openat$random(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockname$inet(r4, &(0x7f0000000280)={0x2, 0x0, @dev}, &(0x7f00000002c0)=0x10) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={0x2, 0x16, 0x0, 0x8, 0x6, 0x0, 0x70bd2c, 0x0, [@sadb_ident={0x2, 0xb}, @sadb_spirange={0x2}]}, 0x30}}, 0x0) dup2(r1, r3) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) r5 = socket$packet(0x11, 0x2, 0x300) r6 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(r2, 0xc018620b, &(0x7f0000000200)={0x0}) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0x30, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="0e630c4001000000040000004000000006631e4002000000106308400200000000000000036308400f445ff6fdbbd08d", @ANYRES64=r8], 0x43, 0x0, &(0x7f00000003c0)="c64fcb66913fe082c3cd8e6c72948edfeaf74192e716e906e84fcc5a29c7b4591a8340841d5febaaa1bc0c8eb947b262790fd7c043a165d3169737590730f64a4cb9e0"}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) pread64(r6, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r7, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r5, r6) close(r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000240)) 03:09:46 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001480)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f00000001c0)=0xe8) getresgid(&(0x7f0000000200), &(0x7f0000000340), &(0x7f0000000380)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000001580)=0xc) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x80, &(0x7f00000015c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x9}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0xfffffffffffff800}}, {@max_read={'max_read', 0x3d, 0x800}}, {@blksize={'blksize', 0x3d, 0xc00}}, {@default_permissions='default_permissions'}, {@max_read={'max_read', 0x3d, 0x10001}}, {@default_permissions='default_permissions'}], [{@fowner_lt={'fowner<', r3}}]}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:46 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_POLL(r0, &(0x7f0000000080)={0x18, 0xfffffffffffffff5, 0x3, {0x8}}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x4}, 0x10) 03:09:46 executing program 2: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x43) perf_event_open(&(0x7f00000000c0)={0x2, 0x70, 0x1, 0xb5, 0x0, 0x1, 0x0, 0x9, 0x200, 0xc, 0x3, 0x8000, 0x8001, 0x8001, 0x8, 0xfdf, 0x9f, 0x0, 0x2, 0x6, 0x1000, 0x0, 0x6, 0x8001, 0x10001, 0x8, 0x1, 0x1ff, 0xffffffffffffff45, 0x51db, 0x9, 0x9, 0x8, 0x3, 0x9, 0x5, 0x9, 0x200, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x8}, 0x4, 0x10000, 0xffffffffffff0001, 0x0, 0x81, 0x1, 0x9}, 0xffffffffffffffff, 0x4, r0, 0x9) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f00000002c0)={'broute\x00', 0x0, 0x3, 0xf3, [], 0x6, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], &(0x7f00000001c0)=""/243}, &(0x7f0000000340)=0x78) mremap(&(0x7f0000a94000/0x2000)=nil, 0x2000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) 03:09:46 executing program 4: perf_event_open(&(0x7f0000001440)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/ptmx\x00', 0x440000, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x100000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3], [0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x100000000, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x3, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xf39, 0x80, 0x0, 0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x80000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0xffffffff, 0x0, 0x0, 0x100000000, 0x0, 0xd87e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x8, 0x100, 0x0, 0xfff, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10e3], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x10000, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x1, 0x40, 0x7fff, 0x0, 0x3, 0xd7b, 0x7fff, 0x0, 0x0, 0x0, 0x4, 0xfffffffffffff801, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x7]}, 0x45c) perf_event_open(&(0x7f0000001080)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$key(0xffffffffffffffff, 0x0, 0x0) timer_create(0x9, 0x0, &(0x7f0000000300)) r1 = syz_open_dev$evdev(&(0x7f0000001100)='/dev/input/event#\x00', 0x2, 0x28001) clock_gettime(0x0, &(0x7f0000001340)) clock_gettime(0x4, &(0x7f0000001380)) write$evdev(r1, &(0x7f0000001280), 0x3d1) ioctl$EVIOCGKEY(r1, 0x80404518, &(0x7f0000000080)=""/4096) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0x8000000000000, [], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f0000000300)={{}, 'syz0\x00', 0x50}) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000013c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001dc0)=ANY=[@ANYBLOB="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"]) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001a00)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x2, &(0x7f0000001680)="295ee1311216f477671070") clock_adjtime(0x0, &(0x7f0000000100)={0xcb0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x7f, 0x2, 0x4af7, 0x9bf7, 0x4, 0x3, 0x9, 0xe00, 0x7, 0x3, 0x3, 0x4, 0x3e, 0x496, 0xc65f, 0x8, 0x1, 0x9, 0x3, 0x7}) ioctl$TIOCGETD(r2, 0x5424, &(0x7f0000001240)) mount(&(0x7f0000001700)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x200000000000000, &(0x7f00000019c0)) mount(&(0x7f0000001f00)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x100000, 0x0) mount(&(0x7f0000001500)=ANY=[@ANYBLOB="8e11c1aa9d11da12c29fab52f51b5c512c0cf74a2d8a91ea2d280a14e87c36804c17bcada44af04d649f852a8701c05b00410ce1090000001f63e0b2a41d90490bfba875476bd9572a49d184ab3caa4de1906f4fc48e02b9977a463097f571d51e5248c177335dd7"], 0x0, 0x0, 0x80010, 0x0) setxattr$security_smack_entry(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)='security.SMACK64IPOUT\x00', &(0x7f0000001580)='vboxnet0/GPLlo^)#[system$&\x7fmd5sum\x00', 0x22, 0x3) mount(&(0x7f0000002140)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x80000, 0x0) pivot_root(&(0x7f00000016c0)='./file0\x00', &(0x7f0000001200)='./file0\x00') [ 957.233843] audit_printk_skb: 36 callbacks suppressed 03:09:47 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) poll(&(0x7f0000000180)=[{r0, 0x8000}, {r0, 0x402}, {r0, 0x1}, {r0, 0x1020}, {r0, 0x4}, {r0, 0x2000}, {r0, 0x1480}, {r0}, {r0, 0x1}, {r0, 0x16}], 0xa, 0x7fff) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) [ 957.233853] audit: type=1400 audit(1548644987.084:387): avc: denied { read } for pid=25091 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:47 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 957.561188] audit: type=1400 audit(1548644987.414:388): avc: denied { create } for pid=25091 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:47 executing program 2: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f0000000040)="1f0000000104ff00fd435463e4af645515b81e0008000100010423dcffdf00", 0x1f) dup2(r0, r0) r1 = socket(0x10, 0x2, 0xc) write(r1, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305030008000100010423dcffdf00", 0x1f) [ 957.770389] audit: type=1400 audit(1548644987.624:389): avc: denied { write } for pid=25091 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 957.782179] audit: type=1400 audit(1548644987.634:390): avc: denied { wake_alarm } for pid=25116 comm="syz-executor4" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 03:09:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2cbb67fbd5c2726f6f746d6f64653d30303030303030303030300030303030303034303030302c757365725f6b643d", @ANYRESDEC=0x0, @ANYBLOB=',gaoup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r1, &(0x7f0000000280)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) connect$inet(r2, &(0x7f0000000200)={0x2, 0x4e22, @remote}, 0x10) [ 958.536587] audit: type=1400 audit(1548644988.384:391): avc: denied { wake_alarm } for pid=25116 comm="syz-executor4" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 958.614025] input: syz1 as /devices/virtual/input/input30 [ 958.756572] audit: type=1400 audit(1548644988.544:392): avc: denied { create } for pid=25135 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:48 executing program 2: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000000)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='/exe\x00\x00\xc1\x00\x00\x00\x00y\x06\x00\x00\x00\x00\x00\x00\x00\x00T\xfa\aB\x01\x00\xe9\x16\xd2\xdau\xaf\xe7\v5\xa0\xfdj\x1f\x02\x00\xb1\xab&\xd7\xa0q\xfb53\x1c\xe3\x9cZehd\x10\x06\xd7\xc0 jt\xe33&S\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00') r2 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6100) sendfile(r2, r1, 0x0, 0x100000001) 03:09:48 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="3867726f75705fc3692c36", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_STATFS(r0, &(0x7f0000000180)={0x60, 0x0, 0x3, {{0x8, 0xffff, 0x5, 0x3, 0x3, 0x1, 0x9, 0x7}}}, 0x60) fcntl$setpipe(r0, 0x407, 0xff) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) io_setup(0x5, &(0x7f0000000100)=0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f0000000080)=0x8000) io_submit(r1, 0x1, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r2, &(0x7f0000000080), 0x14d}]) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 958.773304] audit: type=1400 audit(1548644988.624:393): avc: denied { create } for pid=25135 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 958.805749] audit: type=1400 audit(1548644988.654:394): avc: denied { write } for pid=25135 comm="syz-executor2" path="socket:[61321]" dev="sockfs" ino=61321 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 958.845460] audit: type=1400 audit(1548644988.694:395): avc: denied { write } for pid=25135 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:49 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000000)=0xdf8, 0x4) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000002c0)=0xe8) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4008000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)=@report={0x60, 0x20, 0x201, 0x70bd29, 0x25dfdbfb, {0x32, {@in6=@mcast1, @in=@local, 0x4e21, 0x80, 0x4e21, 0x4, 0xa, 0x20, 0x80, 0x3b, r2, r3}}, [@srcaddr={0x14, 0xd, @in=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x400, @ipv4={[], [], @broadcast}}, 0x1c) 03:09:49 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:49 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000180)={0x3, {{0xa, 0x4e21, 0x5, @remote}}}, 0x88) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 958.874819] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 03:09:49 executing program 2: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) shutdown(r0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100)={0x20}, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$smack_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, &(0x7f00000005c0)) ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000180)) r5 = creat(&(0x7f0000000a00)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x8000000000044000) io_setup(0xb, &(0x7f0000000240)=0x0) ioctl$EXT4_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000100)) write$FUSE_DIRENT(0xffffffffffffffff, 0x0, 0x0) io_submit(r6, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r5, &(0x7f0000000000), 0x10000, 0x407000}]) lseek(r5, 0x0, 0x4) [ 958.899179] audit: type=1400 audit(1548644988.754:396): avc: denied { create } for pid=25135 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:49 executing program 1: r0 = accept(0xffffffffffffff9c, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000100)=0x80) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000200)={0x6}, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_POLL(r1, &(0x7f0000000140)={0x18, 0x0, 0x6, {0x6}}, 0x18) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f00000003c0)={0x4, 0x5, 0x10000, 0x7, 0x4}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) socketpair(0x4, 0x6, 0x2, &(0x7f0000000080)) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 958.924359] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. [ 958.986916] netlink: 3 bytes leftover after parsing attributes in process `syz-executor2'. 03:09:50 executing program 4: r0 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x2200, 0x0) socket$inet6(0xa, 0x3, 0x7) dup2(r0, r1) 03:09:50 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00004aaffc)=0xfffffffffffffa1b, 0x4) getsockopt$inet6_buf(r0, 0x29, 0x6, 0x0, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000140)={{{@in=@local, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@dev}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@mcast1, r1}, 0x14) 03:09:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_int(r1, 0x1, 0x0, &(0x7f00000000c0), &(0x7f0000000340)=0x4) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="6664f54ee378a0fa83267c3d4c4979e857", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f0000001480), 0xffffffffffffff5a) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) 03:09:50 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id'}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x20}}, {@allow_other='allow_other'}, {@max_read={'max_read', 0x3d, 0x5}}, {@max_read={'max_read', 0x3d, 0x1}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="31e8d66bb68c3244142f4865638e2b7a7019d9506df89e23483b2591d7923a02fed8bf8e6f776b787e68d23b3bb8a1832efe56e7b5bfa83010e6249840c66e92261a4ba4c1b4ac8a070b9948e24ce9981eadedbb5d82a1784863f38e7a352f8740f42affe218cd069ecf740c795fc759651f45c9ad18696580567d2e433adaeeb821738263656bec3bea9bbf1d4000b6c8e0a2315f1a49cdb366e8740bf2a7e07d7646372786f07ae6e3775dbca16d254872aa2ca979cb3f617559fd"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000000)=0x100000001, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f0000000080)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r1, 0x660c) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 03:09:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000100)={@mcast2, 0x40, 0x2, 0x2, 0x4, 0x8, 0x5cee}, 0x20) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)=""/252, 0xfc}], 0x1) restart_syscall() ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)={0x8, 0x3, 0x7, 0x8}) 03:09:51 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xfffffffffffffffe, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ioctl$BLKTRACESTOP(r0, 0x1275, 0x0) clock_gettime(0x7, &(0x7f0000000180)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="12f10bc10b35e42871"]) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="747275737465642e2b10"]) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r2 = geteuid() lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000340)='./file1\x00', r2, r3) 03:09:51 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)={[{@sb={'sb'}, 0x9}]}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_IOCTL(r1, &(0x7f0000000080)={0x20, 0x0, 0x3, {0x8, 0x4, 0x800, 0x5}}, 0x20) 03:09:51 executing program 4: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000140)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000400)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000003c0)={&(0x7f00000002c0)={0xf8, r2, 0x800, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x1}]}, @TIPC_NLA_BEARER={0x84, 0x1, [@TIPC_NLA_BEARER_PROP={0x54, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8239}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x8800}, 0x40000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x0, 0xb5, &(0x7f0000000000)='#}\x00\x9a\x1b\xc2_R\xea\xd3\xddT\xd0\xec;\xa4\x9dV>\xa4\x11\xa4\xac\x9e\x1e\xac\xaaT\xd5\xd3\xf8<\xd7Yb\x04I\xdct,&\xe90\xa8\xaf\xff\xd3\xcd\xcd-\x90\'\xa2v\xbal\xa3l\"\xa0G\xebD\x1d\x8c\x8e\x15\x8d``\xb2\xdb\x9e\'\xef_\xde?i\xacl\x03\xaa\xdc(\x96\xbed\x9b\x1d\x95\x13\xbe\xe7\xb8\xa3\x13>\xdd}\x87\xc7Y\xf1\x92\xe3BIky\xe8\x85\xe9^\x1d\xb2\xd2Ycn\x9d\xafQ\xb1\x02\x99z\x81\xff\xc2\xdd)\xfe\'\xb8\"X@\xd6,\xb5\xa6\xa2\xe1:\xecG\x1d\xfe\x86\x85\xe7\xd4\xf6!C\xa3\xcf\xf3S\xeaA\xd7\x11\xc9O\x8e+\x94\x8c\x1f\xd6\x88\x97\xd0\xdd*\x90)\"\xda', 0xffffffffffffffff}, 0x30) r4 = gettid() rt_tgsigqueueinfo(r3, r4, 0x12, &(0x7f0000000200)={0x27, 0x5, 0x7}) fcntl$addseals(r1, 0x409, 0x8) 03:09:51 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = getpid() sched_rr_get_interval(r1, &(0x7f0000000080)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:52 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x110) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000001480)=@random={'trusted.', '+\x00'}) fsetxattr$security_ima(r0, &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000200)=@sha1={0x1, "07d90fcf58c62afa7e2dd5bf6a268f3764e9a200"}, 0x15, 0x2) read$FUSE(r1, &(0x7f00000040c0), 0x1148) add_key$keyring(&(0x7f0000000340)='keyring\x00', &(0x7f0000000380)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) getdents64(r0, &(0x7f00000014c0)=""/199, 0xc7) fchmodat(r0, &(0x7f0000000000)='./file0\x00', 0x2a) [ 962.301674] EXT4-fs: Invalid sb specification: sb=0x0000000000000000 ,errors=continue [ 962.363082] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:09:52 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d3030303030303030303030303d3192e6303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x275) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0xfffffffffffffffe, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x9}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 962.528749] EXT4-fs: Invalid sb specification: sb=0x0000000000000000 ,errors=continue 03:09:52 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f00000015c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r1) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/checkreqprot\x00', 0x40000, 0x0) mkdirat(r3, &(0x7f0000000380)='./file0\x00', 0x8) getrusage(0xffffffffffffffff, &(0x7f0000001600)) r4 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r4, @ANYBLOB="2c726f6f746d6f64653d303030303030303030303030303030fcc3b5531038de3c2c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c67726fb4e44dc05f69", @ANYRESDEC=0x0, @ANYBLOB="4aa59a048d911d9790a3888a8bcb32926194d30827587015c7ff20f83230a354ff93e804e283f378b4aef464e7aeb0abcc767631844c2f167c04ff27cdce1bac774854e313b2c2a1c6e1a42664d17932038aa92eabba1f5461f98751e10fab17ba5b55fb53c906cba9ad157fe4a79d70e8de2ee29c564b"]) read$FUSE(r1, &(0x7f0000002480), 0x1000) write$FUSE_INIT(r4, &(0x7f0000000400)={0xa, 0x0, 0x2, {0x7, 0x1b}}, 0xfffffffffffffd1c) getsockopt$inet6_int(r2, 0x29, 0x35, &(0x7f0000000080), &(0x7f0000000180)=0x4) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="ca"]) ioctl$KDDELIO(r1, 0x4b35, 0x100) read$FUSE(r4, &(0x7f0000000480), 0x1000) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000000)) r5 = getuid() getgroups(0x8, &(0x7f00000001c0)=[0xffffffffffffffff, 0xee00, 0xee00, 0xee01, 0xee01, 0xee01, 0xee00, 0xee00]) fchownat(r0, &(0x7f0000000100)='./file0\x00', r5, r6, 0x100) fsetxattr$security_smack_transmute(r3, &(0x7f0000000200)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x3) write$FUSE_INTERRUPT(r4, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 962.610348] EXT4-fs (loop3): VFS: Can't find ext4 filesystem 03:09:52 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r3 = socket$inet(0x10, 0x3, 0x0) sendmsg(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000040)="24000000280007081dfffd940101830020200a000900000006000000600000000d00ff7e280000001100ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47a6268e3406cf055d90f15a3", 0x4c}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) r4 = dup3(r1, r0, 0x80000) ioctl$RTC_ALM_SET(r4, 0x40247007, &(0x7f0000000000)={0x18, 0x22, 0xc, 0x1a, 0x8, 0xff, 0x0, 0x55, 0xffffffffffffffff}) syz_execute_func(&(0x7f0000000280)="0faef24029450ff3440f1157f19143a1a00f9e0000000000c4627d597f8b54aa400f34c30fb11d0039804167640f71f6452b610dc29004f34c0f38f6a30a00000000008fcd78a30000d45ec31e0ff7c6") [ 962.700010] audit_printk_skb: 18 callbacks suppressed [ 962.700020] audit: type=1400 audit(1548644992.554:403): avc: denied { read } for pid=25217 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 962.843126] audit: type=1400 audit(1548644992.694:404): avc: denied { create } for pid=25217 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:52 executing program 2: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000000100)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f00000001c0)={0x0}) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000200)={0x0}) socketpair(0x0, 0x4, 0x3, &(0x7f00000003c0)={0xffffffffffffffff}) r5 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/access\x00', 0x2, 0x0) r6 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x810, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000e40)={0x110, 0x0, &(0x7f0000000c40)=[@reply_sg={0x40486312, {{0x4, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x18, 0x28, &(0x7f0000000140)=[@flat={0x736a2a85, 0xa, r1}], &(0x7f0000000180)=[0x40, 0x38, 0x38, 0x0, 0x28]}, 0x80}}, @free_buffer={0x40086303, r2}, @reply={0x40406301, {0x2, 0x0, 0x2, 0x0, 0x10, 0x0, 0x0, 0x58, 0x20, &(0x7f0000000240)=[@fda={0x66646185, 0x2, 0x0, 0x4}, @fda={0x66646185, 0xa, 0x1, 0x3}, @flat={0x77622a85, 0x10a, r3, 0x1}], &(0x7f00000002c0)=[0x30, 0x40, 0x38, 0x28]}}, @enter_looper, @register_looper, @register_looper, @clear_death={0x400c630f, 0x3, 0x4}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x30, 0x18, &(0x7f0000000440)=[@fd={0x66642a85, 0x0, r4}, @fd={0x66642a85, 0x0, r5}], &(0x7f0000000480)=[0x28, 0x20, 0x58]}}, @acquire_done={0x40106309, r6, 0x2}], 0xa2, 0x0, &(0x7f0000000d80)="38cf4b97044b259a4d62cdd25a023b7fb7dd45bcfe53427c7db9ec539a6092c93bdbb71e36e4a3910859cd5e2fdf867403878815092fc650fcb71711462a701d0785b80cc887f44ab358c7c04d7b65e3b3ce641c691ba137e57723e7de5c3af1ccc49c01fa08f8a38a79b7e703a7a702c6fe359de6941b0c36f19be3b7d38b00409296c1a79fffcaaf70f1473bbd7034a2a7cfcadb2126904ea93ae41f8a557f431a"}) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r7, 0x4024700a, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x19, 0x0, 0x8af2}) write$binfmt_elf64(r7, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xfffffffffffffff5, 0x1, 0x6, 0xfffffffffffffffb, 0x3, 0x6, 0x1, 0x7a, 0x40, 0x2f8, 0x1, 0x0, 0x38, 0x2, 0x9, 0x926, 0x1}, [{0x1, 0x6, 0x9, 0x6, 0x7ff000, 0x401, 0x3, 0x8}], "d64c6ad3646e6dfb54854d7d69abbbb1c72340f7cc4a3f76cb401fa01e98a9ae358583cf582a15d96b6b4c48278461ab5d484df1de2088e2bd549dc899e4c165977dcbd7088ddf011b0e7e93"}, 0xc4) 03:09:52 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./control\x00', 0x100, 0x83) getsockopt$inet6_tcp_int(r0, 0x6, 0x3e, &(0x7f0000000100), &(0x7f0000000140)=0x4) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f00000000c0)={0x0, @speck128, 0x1, "bb70aa646407a5a0"}) mkdir(&(0x7f0000000040)='./control\x00', 0x0) execve(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000200)='^bdevppp0\x00', &(0x7f0000000240)='self]\x00', &(0x7f0000000280)=',security#\x00', &(0x7f00000002c0)='vboxnet1&mime_type\x00', &(0x7f0000000300)='[vboxnet0[eth1vmnet0\x00', &(0x7f0000000340)='\x00', &(0x7f0000000380)='\'@\x00', &(0x7f00000003c0)='\x00', &(0x7f0000000400)='selinux-#\x00', &(0x7f0000000440)='GPL:posix_acl_access\x00'], &(0x7f0000000640)=[&(0x7f0000000500)='keyring\\selfeth1J/vmnet1self*mime_typetrustedbdev\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='.securitytrusted*\x00', &(0x7f00000005c0)='securityuserwlan1vboxnet1eth1\x00', &(0x7f0000000600)='bdevem1nodev+/\x00']) r1 = open(&(0x7f0000000000)='./control\x00', 0xc40beb2474dfd22a, 0x0) ioctl$BLKROTATIONAL(r1, 0x127e, &(0x7f0000000180)) 03:09:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:53 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000340)=@random={'trusted.', 'bdev]vmnet1)@@em0]{ppp0eth1\x00'}, &(0x7f0000000380)='/proc/thread-self/attr/current\x00', 0x1f, 0x1) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x4000, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000001c0)) [ 963.398493] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 03:09:53 executing program 4: r0 = socket(0x10, 0x3, 0xc) write(r0, &(0x7f0000000180)="1f0000000104ff00fd4354c007110002b805010008000100010423dcffcf007ec3092f615abf25bb2d48ef654fe19f3d74bbbbaef8e60557f5952d1f0455a02579ea2cfa302785440aa3d193d945870cce32da38def1", 0xfffffffffffffff2) write(r0, &(0x7f0000000000)="1f0000000104fffffd3b54c007110000f30501000b000200001b05000200cf", 0x1f) [ 963.591217] netlink: 8 bytes leftover after parsing attributes in process `syz-executor3'. 03:09:53 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x101000, 0x80) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) geteuid() r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x240082, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000080)={0x2, 0x0, 0xfa32, 0x9, 0x0, 0x3f4d}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/fscreate\x00') preadv(r1, &(0x7f00000017c0), 0x10000000000001f7, 0x1000000) 03:09:53 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, &(0x7f0000000100)=[0x954, 0x7]) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000002480), 0xffffff4b) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) fcntl$getown(r0, 0x9) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:53 executing program 2: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x14}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket(0xf88885e6dc7da7f9, 0xa, 0x4) fremovexattr(r1, &(0x7f0000000000)=@random={'security.', '\xf9\'systemcgroupmime_typemd5sum]$ppp0\x00'}) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:09:54 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0xfffffffffffffcfb, 0x0, 0x1, {0x7, 0x1b, 0x0, 0x0, 0x0, 0x8000000ffff, 0x0, 0x1}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x10) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 964.329900] audit: type=1400 audit(1548644994.184:405): avc: denied { create } for pid=25279 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 964.504425] audit: type=1400 audit(1548644994.354:406): avc: denied { create } for pid=25279 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:54 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000002c0)={0x7, 0x70, 0x2, 0x8, 0x6, 0x1, 0x0, 0x6e9, 0x4, 0x6, 0x0, 0x0, 0x81, 0x200, 0x8, 0x3, 0x2, 0x0, 0x2, 0x101, 0x7ff, 0x3f, 0xffc00000, 0xfffffffffffffffb, 0x8, 0x7, 0x9, 0x80000001, 0xe157, 0xff, 0x800000000000000, 0x7fff, 0x8, 0x8, 0x8, 0x1, 0x0, 0x1ef, 0x0, 0x2, 0x1, @perf_config_ext={0x6, 0x9}, 0x8, 0x81, 0x7, 0x0, 0x9, 0x7ff, 0x7ff}) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$unix(0x1, 0x6, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x100, 0x0) r4 = accept4$inet6(r3, 0x0, &(0x7f0000000100), 0x800) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2208c0, 0x0) ioctl$KDSETKEYCODE(r5, 0x4b4d, &(0x7f0000000140)={0x80000001, 0xfffffffffffffffe}) ioctl$GIO_FONTX(r5, 0x4b6b, &(0x7f00000001c0)=""/244) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000001640)=0x0) r7 = geteuid() r8 = getpgrp(0xffffffffffffffff) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000001dc0)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001e00)={{{@in=@multicast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001f00)=0xe8) r11 = getegid() sendmsg$netlink(r0, &(0x7f0000001f80)={&(0x7f0000000340)=@proc={0x10, 0x0, 0x25dfdbfc, 0x600000}, 0xc, &(0x7f0000001d40)=[{&(0x7f0000000380)={0x10, 0x11, 0x200, 0x70bd28, 0x25dfdbfc}, 0x10}, {&(0x7f00000003c0)={0x38, 0x10, 0x400, 0x70bd25, 0x25dfdbfe, "", [@generic="3558ba93d06835c27be69e446ea5b98c293b73adb62dc79cd450f3d5d46a172399f54a0e1f01"]}, 0x38}, {&(0x7f0000000400)={0x1234, 0x15, 0x200, 0x70bd2b, 0x25dfdbfb, "", [@nested={0x5c, 0x2d, [@generic="3d1ddaaddfc200781df3fccd739c1f017600dad818add5f4576e2a37f3b6aa52840fb0260c93bbfdd60427b037a4aade57192a7539425e54d29542fd06efd8a2142f45c6b0f0f2bcbec208e446c241d5b2f06abdc0"]}, @generic="b2b4f44c4be98f97215c4de531b82ab5876a58a972ecbfa61d99483a61df88c08eee4bc7dd3659ee13d07fffd33dd4d492699803fadc195e7578c89d66985d19895ae9099be735c1a7f880037c94bd7e85b35709e56684ce615dee4ce11ba730e89d6d450f145dbaaaf7ca0503b3cfec5a2cd0142e8f5c14e047ad300a562810f3bf3275afb60542da5e9aa668552663af4bfd34bf21717c04c32f4cd5bc26fb3dc0bb7b5cf27d96ed8aa4488d12146e777e45f3dd00d5b50b714f4b7b8427a0bc87cb33ba3fa42f59c83192a52dda6ba0ada77333ba5ed5a1d6c69d", @typed={0x14, 0x91, @ipv6=@mcast2}, @generic="30febdc478af4ef0656fa9e0addb61511a7da56f8ca176db3753caf67e52acfdd9bf91fa598fab0fa3a88a631e6628af560c1b0e940a3eb319534a6ee2ad5ef113891ae2c211f2dbdb62d5747ef9ec2cd8d448923e3b2a69249df92b25cd8719dcdc3fbf867340dafb456f0d11cab535587cef11aa9b6f35791805c83c122c7534e15459337357158aaee735e1706479b90a1d800e0b738d5d0eefed627e40821355cfa9515b59fed840e9656863cb3283e32ddf65e02810106161abb4af4e59d8d3f89260762f0193a1914b3729bdf3d90a08", @typed={0x1004, 0x33, @binary="9f17e850d51b7591f1e3575334ee3d79cace26b29b6627bf71f95c4fca37117b0906a48d5ed9e718af5b2903d558bf9ae96a04bd22d92205f21e7bcaff1dcab60e30dd7e1e8c809e444ed372cb6c7f2d851686958651c7bae3035a53dde82d174ebce9c718e49832eeeabefd28c5fbd8d32a55e86eb45753efe1cb3b7789ae3fb2dcc8c6055001430eafe7dfcedd163845d9174c1c713b678c26e4d4062f6e179b6610a6a59914f418a766d7ace5d65a66d7136915e822be1ef3c108d548b1ef634df6def11277a477873a274e62da46dee8abb2e932ab44629ac075ab0d60e4cfaf18a1ab64193731f576e52f0c119e9b3bf47a297afde47410a7ff4cf52ff3c2f68ddaf553de84f9538ddd1c1b9010f3aa6d1061c8dba807a1995c950e4cd82032244d164ab225f3301bcecbcefb40c8dec3ca889c9aa3940c4ea699c2e363e3767c182c995867f9d01f51800b8f1a018ab5051edb144bd2fe8d77a22535b1bf2b43600027fe6f2d17bdb8297fbef4b41cdeef9f7da64bfc1e406f676785ce09d2e71a601d0347b95f8babe853eaff5a2f823853a6c7dc7b627add5d21891311046a12a5ac1d4a0b35b148f36d571d6ea7821f3ab0d7c70d6bf2d4ba5944c76deff1f52c26dafe9a81c93686cf34dec83895881d2d3ce0c81480654c1beaf422ba286a395c73863fa809ce8775c3953c4b9e294b47d34fb14afb3f21413986d27c8f4ead9cd2136f23f8dde0bc59a9accd140de801c76be107427b3f9a5c132348791761bc21da80478bffc5f8da7f5b036003b3f773c2355591c6827a1d54199bd7562bffcb9b36359e99ddc27fd63dee7f75cae07e7c6579d75a9ae3cd2e31e9db8a20946d062f2951c266df9eff7fe6dddec728e670698a6688ef3afbc7fb59a93cc9869656a7252115c827026e390d900af38323f666342a8bc9b309f93037aea1c5d3450b2b4ed54649dc4e0f2a9799f1646d66004e65888e312184a6d9586e9b03d3e2c6b2cb691b99b53118f2c3d75faa837acadf65bd41bf350fe6bb91ff9bd91e714b90b0f34f4262542fcd3a0645db74c4ffac247d10fdf58d5efc4df243c3603cecf71722a725f89ca05de5e6a536d05af007302bce2592acbdf6a3ab051f5fa53ef31c2f90dd1ae03bfccffb634a0d01847441bd370d25dda92e73a40c67cd2ea4b8ac3ac1d39318b88f0d1500d129e440acde35eb8e0cb642cdcac874c8a96478cff356f3752af4c0d89ffa3c52fb3d74a7c886e7d0b3b7be32a333f3297a4ddaa184583156ea7bc3a6bf2432d9632a2a62f5ccbbd8ab8be6e5b626bda34bea1cc68585aa9658cd0a84e53ccd7cd91f170ab9c6776b7e8d0e3a6df89a1863dd94170b1db20eef1539c2b7470d19aa1edee5f23bd1831f843aeadadd387caeca332a6b11a694a93569163dc95242a1fbecad0a8d5171cc766534384cacf2f9bfd0345e6d707d5513fb057f6c2df39b274958e9ebdc0169c00a904edb12cc11cef471d066b29e5a7075f58b2cc9335c406e5373817bacc70e03f5253934c0bd93412d7e0f44add0bb19f4cc9df0533b1cdfefb4eb5c020c1aeb341f5bc39da33d5363a4bc16a7e8b5630fe1d7b1758f154680126e968ed23e170852b65cf973d5bdbb33c84be0aa3213c292a6e7eb9c3c832f334adaac743f955f7d154f32a4fe6160018fa97d5882c8d4642bf19d22c850969ddf208d6387fef45f705d62e9df4e415c7b2c570a7e0df5174cc0c2ffd3461e7e930ded09b711926cf41194b000c604070803f8858ebd487be4d1bba0a4316854f7da599da365a1c4de8f2687ad273b8350d62dbfdca1fdcd29b01959f90d35bded9e9102fbed53741b7000d561d915c10485923381b3cd67ae869646dcae5a2f1125e7ad412c06f42706e7a4a7d01e47c3c4de00f7db3efc6a15a985bc4065aa8e0c3a3a2fb867e71060508f2713f7115c11549ead78d11bc49293f89344848e72e2a854a5ab06bbe7f7101bce0862afa24cb06f0d3ae603b60169faf849fe786ad571bd546086679e0eb41941f52f6af41e6ec52ccea2747ee67817e5aa4095ec1db6349a4f929dd9f49a029b9743ed91554b81235f9dee9cc2589f5d8717c7434ce00fc9b0b1290b753a10d975ca76b0eaf868cd5ed0b79fcd74bfdb63bbd0c2e0af846c73736e38881da6bc6bb6eeff8d3226a7274bde915a68459fb7e002fbbc55bace160ef5684113f6ed1119526ffb8ea73bbea49b82351a1fb447cc519387a5166d6c8daba02b35617a071a6bd5a5cf1c175769d04669a7e39155dbab98349155662b148aa85d0e6855f19ed31a0c614d363437d31404fb78d97ffde3ee5d7a15a83dc7ac2e90a461ed0514ea40103c19ca9a3732841a535089217be42b4f13be730360203876befc3b25c80dbc17a62dd7482d2358f249d0f931a91bc7f72b89b061eefe381c89b56a484ffcac94056c97aa316a4e4f84af481ba9b2831f2789992cb2544b95362e5c18badf1324f712228c425810f712769309a815515c5e37fd2cdbe506d27273203b644b7a4038324c40d79f5fd6abe5f65208960e8cf1b9259c86bc3bf3444894e0135c2f52c7d3c8c32e5ab52b41e73d0c8fad605c0545b8ce2b99ac17e51be5b94fd5558c0d33d4b6e7727d5ccbda92e25c11452e427282b81c485f6cf0550bccd92b82c5f46df663f93d3bc2b608768aae8c71ac0f5d3b8aa9534414da5d52ef4101688090fcc876a57533c4d780104734261028be7d45d18e5f386cbefb21a7683fa90a500b9ab1ffca36e1fb7b3ca1cf561af752d5e53e303d84a88270e4f142052c1c95d801817cb390cc141dfaeed7c2df54e8ab189e6518625f6a52b7abcb4cfe338f35c480306856b48f2e785b9125b485e24b72a8f3e166c410546cc3749d33c0228b06a0a15acb7fe9581e61d150693075d382dedeb193fad8467d3a3f9aeb590e1519c38a237e9493a1cfaba857a80f62908479ec3ad0ef3b1a5c08833f9858c5d2a38885ca6721d7c07ea18a12b6051079a6482420fb9a03884548d05b9f7855ea99ce97ada3c8b2900cebced4e8d880c2840558617f4fb9a31990dd1e88ff534a1bdf252c885f348fa51e40d4890d96fe68562245a1682552872ab30accdf44d5d5afa1d5c8e0504f50fc5301733a5fb636ae3ca8284449506ddb74ea637c45880a1d12444180205bf0e1d43063a7313e15c92eaa44342e02220fd917d31b6eb3454fd1ea32b5aff374338ff69c12f2023824a068de14b1cb5440694e3c5bb2b994a0cc4bd3af950a8515df3b945f49d3ecf49ed977553554a06d5e7ee46e9c0c7eb3482c0018a9206227ecc3ba13e3a841cc18d6b8b5c3efba8a8bbc7ca021841cc7d1fd31e366cf24041ed49cf68fc3ff7f6e8c9dda94f8fce2ec0552ee375cba7ee784f6a67ff9db4edfdfe890327b86208ad3a1e71046712048fd27afab4886b2600e8cc036f6afa93d3d7b8d450c184678d2436d7a1948f4f4966097416ab44fc89fa26c42b734e33bf9390e51c68ef1f70142b9355b1c2927d5c667a855192fec786ade4dc0da1c67e69672d98012b37056591cdd734b31e33cb1f3a3f9b5ba3e626f1cb53e495735e9409199b484d4af0a56f1b0d09bdc723800ec1d8db338efd649da90ee6c249783458f3097f8c4dd51f455207afbc81b0c572a374b5569a82fa68b722f4377303dd2cd1ab4abe4cbaa8b6a6a61cc2e73eaf74948a82871356e8a48e43b4b4baf40415eeb942d10a837c14238d29399a15294bf819663a0da390b8632b359ce335536c7c2b93b98307b7eceedfc331be8ca38f7a54b3e114308673589e0f21978f10d894030c172ed30fec8db93ff32e9d6954060e8949d11e0f31b2ef9bad306aa9b7111e8b3d970c439a5f48700053fda728ef9eb95269f9ac9f4494247ebfe10ae47292c5b72916bc723816650b73aefe5eabdf45f38dff9b68dab83918c066d4a47f20b4fd700dfcb946e3d68fd6101c984676e6325a977eaa64001ccefdde57360a2533cefe0171b932afdc9e10efbff8a173ab50a081fd115b1115ccff97eb388694c148414ec64d48e953e1c8f035941805f047ccefd603b5ede945b2510fce94b81ccc9da13833c14387cb499ec9bf3187f34fa5c7ce7574dbee872d536b1de926e8a027a518e41dbd321b74c17c4d3d4406d84c4309328ee50231fdea3dd1c9fe71857e7fcbd2a25436a7dd5f4912e0d5cf7926f1e14659800981d0786cc25035f680329aeba88132bdca7d85999d3cdcb669a5d666bb89fcfd5dfe4276ba4097f0c1ff94182da3bba638fe925bf5a90b0dfbb811d2cfe1a31108ef5b67d2bf6d53bd80a236730a7f377852267058bb2a65b1877a34c0e4ba220a3f69a101b4bf5605a27eb3020025d2bf4c5a44d1cb6bc8328674af56854051a31c7a56dd90a2aee2661623baf88fc423f0caa7156821e0753e683081912d8ed7406d094f2f50433b38625ee110cfabb069426fc1977ffb9bca023ee142a805c1438df7bcb8b1044124b50d208d14886037f2c60e829e8d7333120dd01701e4a51f51fe4de887f24382f509bfe89ba7f970ad5ed26c4c7594dc57244a266708f1abd16537dc33b6da0ca31614c382c993a6f9c454ebb66ff423c3535ec3b6cf90ffc0e215b8d08649716dc3459b5d3ebbeaa1d1e11f048914f2860760bba2ed3db81f6aeff8a5222cdec7fe607911964fa648bf6dd138b734cb9fd3f952a62c77e2fbed81673657fcbdcb04941964ca75f7e69290906e11bfff5f1e079634948290473ec7748112f14942f6d77cfa5bc5421ad8f2acd6a62ce1f17efe7321a8948ad57f26362d2f60833b21776567ad54f76cf54fb61592add2b71cb2f13d8e999ec08869f6db3ef99d4bbb71811f4626b0f38699306411b4c321d6683192e18808132b5c9353d6cec1f95f46b96af3bda544e60643e8dfcf3358f8bf9dc1d16a4a706bf39a89190336149af59dae3252906580a6cfdf735c91cb189ae0a209f6e70217ad8bc46697994cb7610bf5c244626c1e2f69cfa8c29c7aa0423a9d8f2c9618839bdf8089f794ce68b9b4f25aba9d01225bc5c81e492ec00e47f0829366c8031b0fa3c7c8e9dfa738652c00609a0d8c891a6e2da00dd314769e8116b2b8c87ea0d33891300144078cb1c34c6d8314ec4cd7c2728ccb032c12d87a9df34b20a9ed8860008436cf2864896dbaaa0abafb2e2a40abeea6dab7fc06319771eccea87eaa0f1c1b451c95b92ce8c3ecdaf3d39243d5cf0dc57e4ca240b1d2c2629107c1174bdf4677cae6eccee805b6d252af38937e73d90536f28af0743832441aae84156697241831824a197f49824abcaa4203638614e31574f5dd9d937f75d088224957d410a801aeeba5af791241e9bd009a3c094799a9971cce72f0aae19650a9f6a76c132bc7962a88dde2870fd9e4eaefe85515565eb9188f20bdf3f69c02490e8f7c921afc44d4d1daba263a608c6806c613cbecbd33060c2beba1506aff9241eaf467117ba66a01ebbfc2ad6a9a5fbfd7c1b622875b683864b07a25a27fdc357ce49f5b82f18c8bfa10eda993d017cec117455fc6a311c72f9a228d06a88c8560a8a89c71ef4c056b0c1d79d351391f1810cc0a942aad5f517d467d22229b06d4e8b0470865142f3b0da8047d79fa7dedf1fc287939e55ff0809a41b7c1d57eb09de45c405879f068219d29b11ffe4a2af934f6cf5e453b470de3111b351438eea28fb22ec0e676fce3ca2069572152ad6988e3c9e8071d3891011a550509a3fe12d8199"}]}, 0x1234}, {&(0x7f0000001680)={0x484, 0x2e, 0x2, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x3a, @fd=r1}, @typed={0x14, 0x89, @ipv6=@ipv4={[], [], @remote}}, @nested={0x1a4, 0x27, [@typed={0x8, 0x4c, @ipv4=@loopback}, @typed={0x8, 0x8, @u32=0x40}, @generic="63f4061c94af0f0051d3abf7b1726d4cba1fd9b3dce1b91498d1e9d87a5acaeefbb869a0114f70f083dc7902420199fb2eaa300b68bb0e87ddd2c2dc4d5e8842471b04822101210ec709bcf006b596efa6d7951b3b3631b4d9ebd3e48c8be6b025a8e7238bb50ddc3530a9a9b554cd5fc161a9f44bf043c5ebb87da1e5bc22fca0d56463e519c787b2e0f23e8d6f4ad88ea07ec67fdfec111a859bf466b283a7e7d21f3e153dab6b6ef22ff6353c99da88827c7280f0c1e09520e6bbac8feaa81dd84f38f5cd8ced9d511dcfa097bb2494c0b9de47dc060b74c499cc8e11c8e6600dcf", @generic="2c1ba8f3e96269aca5d12660d22c644fc46331702acdfc654767fb66834bf8e89b6a4c677367ab64db0de2e8465b81804097f35db2eb607296fd35b1e9fb62a02f063244734d7e83204b5a5cf4276ce580d0b242978f09f2fbbe1addf0a2222222afa698ceecb2f7048340c33667ab97b7a59412115e4a2db35a4774218bd46b4ffa737bfaad7dc98d629c371c3c1ff5e6294e2ed3d2791fdc96b5ccec33bb69e5041b9b7a553e1ad0b3ed22e2"]}, @nested={0x194, 0x16, [@typed={0x14, 0x96, @ipv6=@mcast1}, @typed={0x8, 0x3c, @ipv4=@broadcast}, @generic="77fbd312b259f0c59260c136867861e61739b956bd8fcf4bcc6c9fa4ebb1e0a10e2f4ee054e9ffb27ee8b40134eb6e7b43003cd32483dd1137a55d274c2d9eee3103fa08bafd3f10078d53c695dda0c6c8db0fcf642cb645f2d838b443eef8eff85c407fafc2636473ff", @typed={0x8, 0x8d, @pid=r6}, @generic="214606bf880d26aa7a022ec1f0d12597cbd183eb7f341960dbe4e1abf99e47937910db687747dfca16ba9809793f09c3d1b77a6d7a2028fe6d8e80e7cb5d53750848b8881b05d82e8c90e56906c83116d3121b0a41e6d854efcaf1c2d6dd77c8b3c65d17cef2a403262f368aa639b9bb0fa79f3fd3dbf967b968ba0b1ad9afeca722ed", @generic="e97c97d38511311420b127e0111b526f86abb2794b631964b81e7678ba2fa4af3051b86c7263c1944cbcbe2b2c789f31456794ee4505f3163766ee57cb6baf3076ba9bd3b79b901d283937a19485c18d7a0e44887572c1ad83889fba0d498f952bce0541318b490dc8fcd83bd4", @typed={0x4, 0x83}, @typed={0xc, 0xf, @u64=0x4}]}, @nested={0x24, 0x5a, [@generic="5a3a8bf93f665f321a9e22fd12387f51027f1148774e2d126d06f3f8541dbe50", @generic]}, @typed={0x8, 0xf, @u32=0x9}, @nested={0xf4, 0x8c, [@typed={0x10, 0x63, @str='/dev/ptmx\x00'}, @generic="3a08cfd035e73289fa761179985ba4ca29bfb84a9edb045a4f9addd5ca9cb89804e9c301e6b4f567cdd209632e8615872db635858aaff0aa09717dfdd44004e699d00376c7e73fa34215977e67ff94b9f739472ca85186", @generic="7b09f02d76ee5d6c57277255cbb47c6ec61d4ad0533274a440825131a0133b6377d421138cf13aeb90925a18224fb094bce95b89fa67da462f895816fb34cfb9b722d399795ca951c23b86d60cd2537a9487b7d3efd0684251d61bd6dab828d85603cdc82242dab32d052934adad0020d7e02c270d2a6d8629", @typed={0x8, 0x4, @uid=r7}, @typed={0x8, 0x94, @fd=r5}]}]}, 0x484}, {&(0x7f0000001b40)={0x94, 0x42, 0x2, 0x70bd2c, 0x25dfdbfb, "", [@nested={0x84, 0x3c, [@typed={0xc, 0xb, @u64=0x1f}, @generic="0933e74e0aa67b69bc63307b07dcf3d45c52f12f8bda8a8f756ebda090881e369957e7039c711abaaceb0eb8adc093930c065a5545765c6dbe975efa9af68afa6daf06b02ae731fe040b96fa4e4e326ee428d137248040d99692b855bf1a1caa0ee9880535333d181afdace5c99fcd012a"]}]}, 0x94}, {&(0x7f0000001c00)={0xd8, 0x23, 0x300, 0x70bd26, 0x25dfdbfd, "", [@generic="9a7acd0a55bec00dbc864c4c9553fb8ff294ebf05c797c48b3c7b6afbcf1889649a1daab95c928937359139df8407586c2b94bed6c86c17713dba0829632cecdf570dfe913b5559710c39ac68b09ba2d24e63bf5b5f292312c09765a97b4e8ada1ff6b07f33235440b0b52e912dbdc2d85d0e03d96319757597180881b1ac85abe4e7a3510b0d1711450df23669271f1051d6e35ac83b80981a3b0becd3143faef93a1f3ac22897d21f5ea37ba0aa4869eb6f9109f1c25083639fff54525d842", @typed={0x8, 0x38, @pid=r8}]}, 0xd8}, {&(0x7f0000001d00)={0x14, 0x40, 0x500, 0x70bd27, 0x25dfdbfd, "", [@nested={0x4, 0x58}]}, 0x14}], 0x7, &(0x7f0000001f40)=[@cred={0x20, 0x1, 0x2, r9, r10, r11}, @rights={0x18, 0x1, 0x1, [r3]}], 0x38, 0x4000}, 0x80) r12 = syz_open_procfs(0x0, &(0x7f0000000180)='net/snmp6\x00') sendfile(r2, r12, 0x0, 0x20800000bf) [ 964.564429] audit: type=1400 audit(1548644994.414:407): avc: denied { write } for pid=25279 comm="syz-executor4" path="socket:[62483]" dev="sockfs" ino=62483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:54 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) r1 = accept4(0xffffffffffffffff, &(0x7f0000000380)=@vsock, &(0x7f0000000200)=0x80, 0x80800) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f00000014c0)={'filter\x00', 0x7, 0x4, 0x4a8, 0x280, 0x140, 0x280, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000001480), {[{{@arp={@empty, @loopback, 0xffffffff, 0xff, @mac, {[0x0, 0xff, 0x0, 0xff, 0x0, 0xff]}, @mac=@remote, {[0xff, 0xff, 0xff, 0x0, 0xff]}, 0x7, 0x9, 0xfffffffffffffff8, 0x7f, 0xff, 0x4, 'team_slave_0\x00', 'lo\x00', {0xff}, {0xff}, 0x0, 0x353763fec034df6f}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@local, @local, @loopback, 0x2}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast1, @remote, 0xf}}}, {{@arp={@remote, @local, 0x0, 0xffffffff, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0xff]}, @empty, {[0xff, 0xff, 0xff]}, 0x2800000000000, 0xa29000000, 0x5, 0x7f, 0x5, 0xf7, 'syzkaller1\x00', 'veth0_to_bridge\x00', {0xff}, {}, 0x0, 0x4}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @multicast1, 0xf, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x4a, 0x1, 0x1292, "e06d955e9e4f2eacd7e66137cda6f294", "a7bae1bcb38e4352b812c72709cf38115e08638b04aa1e75bf11d3ee6363d8abb4d2db45311ca9c529f203558962c1a6b84601c2e9"}, 0x4a, 0x2) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:54 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r1, &(0x7f0000d65000)={&(0x7f0000de2ff4), 0xc, &(0x7f00007a8000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000000301ffff00000000000000000000000069580be59a6ece24f98f4f81fd76852ddd97cce8c2b2389881d334edf604503b1b0fd6ab34af67b83bb4a625009c99d59e826fffd24ebe43151a93a028f3f27f408a0fcfb80be8d22639661d54152cd524619a57e9201455e31bebf4a7001ed09b805e702f687c562136aff1e30591369fd8cbceae7efa429edd0f91182417aaff111bddf417b9dccd7fd5f440"], 0xa1}}, 0x0) r2 = fcntl$dupfd(r1, 0x2599fd92fb3190e7, r0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r2, 0x80045400, &(0x7f0000000000)) [ 964.566590] audit: type=1400 audit(1548644994.414:408): avc: denied { write } for pid=25279 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) fcntl$setlease(r0, 0x400, 0x2) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="3d92e136ee2e9fa93891fb7cb3b88ed06c6f4de6c6ae958847854d071e16793c37d0e3a89f38dc3c8c8b833852bfb2443fe35e7ee97e401f09b5f0e967d2568f39042128cc6bf900000000000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x301002, 0x0) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000180)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:54 executing program 4: r0 = socket$inet(0x2, 0x0, 0x0) dup(0xffffffffffffffff) pipe2(0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x42ff1205d2688b21) fcntl$getownex(r0, 0x10, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000000c0)={0x0, 0x10000000000a}, 0x1) r2 = socket$inet6(0xa, 0x100000003, 0x80000000000006) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f000095bffc)={0x0, 0x7}, 0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000000c0)=0x80000001) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(r2, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x0) flistxattr(r0, &(0x7f0000000000)=""/25, 0x19) accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:09:55 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000380)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x6, {0x6}}, 0x18) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 965.395242] audit: type=1400 audit(1548644995.244:409): avc: denied { create } for pid=25308 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:55 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xe) ptrace$cont(0x80000000000018, r0, 0x4, 0x800000000) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@initdev, @mcast2, @mcast2, 0x0, 0x0, 0x0, 0x148}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 965.647348] audit: type=1400 audit(1548644995.494:410): avc: denied { create } for pid=25308 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:55 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303004000000000000003030303030303034303030302c757365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c80"]) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) r1 = dup3(r0, r0, 0x80000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000180)='./file0\x00', r1}, 0x10) read$FUSE(r0, &(0x7f00000040c0), 0x1148) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/relabel\x00', 0x2, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) prctl$PR_GET_TIMERSLACK(0x1e) 03:09:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001840)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x0, &(0x7f0000001680)=ANY=[@ANYBLOB="8b0c196017d737d99d28f9d6fb21e11e8b1ae48c4609d4890b638267ab864e773b89b61e416d7bb9add094ca92a3daa802f9367ffe0ab02c7e1529366d1e886a0149307a26a5703ac30fd1b5a6ce57a046191ee246109d81"]) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="847275730e7dedf6747465642e0000494302508644a3ba89011e6a1b37ed3d347fa3930784a802216f4169394851156b21021e83663fa023ad9c8c37ec00e0204fe5e9089c9fa898350249781eae"]) read$FUSE(r0, &(0x7f00000040c0), 0x11f7) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) getresuid(&(0x7f0000001540)=0x0, &(0x7f0000001580), &(0x7f00000015c0)) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001600)={0x0, 0x0, 0x0}, &(0x7f0000001640)=0xc) chown(&(0x7f00000003c0)='./file0\x00', r1, r2) read$FUSE(r0, &(0x7f0000000480), 0x1000) r3 = add_key$keyring(&(0x7f0000001780)='keyring\x00', &(0x7f00000017c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000001700)={'syz', 0x0}, &(0x7f0000001740)="bdcf9df7e4", 0x5, r3) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000200)=0x0, &(0x7f0000000340), &(0x7f0000000380)) write$FUSE_ENTRY(r0, &(0x7f0000001480)={0x90, 0x0, 0x1, {0x3, 0x3, 0x4, 0x100000001, 0x4, 0x9, {0x1, 0xc4, 0x0, 0x1, 0x4, 0x4, 0x100000001, 0x3, 0x1b9, 0x3, 0x8, r4, r5, 0x1, 0x7}}}, 0x90) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 965.694678] audit: type=1400 audit(1548644995.534:411): avc: denied { write } for pid=25308 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 03:09:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_int(r0, 0x0, 0x1f, &(0x7f0000000000), &(0x7f0000000080)=0x4) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x18080, 0x0) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000040)={0x5, 0xffff, 0x3, 0x0, 0x3, 0x74}) perf_event_open(&(0x7f000001d000)={0x1, 0x36b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x3, 0xc) setsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x1) connect$inet6(r2, &(0x7f00000000c0), 0x1c) sendmmsg(r2, &(0x7f0000000440), 0x400000000000211, 0x810) 03:09:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = signalfd4(0xffffffffffffff9c, &(0x7f0000000080)={0x7}, 0x8, 0x800) fremovexattr(r0, &(0x7f0000000100)=@random={'os2.', '/dev/fuse\x00'}) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643df8c80291d61198042b8d9c5dc29defb835962785aa55961cb55e3fa1e837a14e53597e419c464937b3d79eb481af578367c9e47b9a34cf154d63edd5bedeadf677f424458ad64276a10a34c04c04d44d2e3daa137d6532af9edcb074c5689ef7", @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d51e2e04d550ef447c4240d5434c5814fd51d7b6f0f11c29d684f05b222b38edf242793cc6ebd05f338ffecabcf32f530cf74708f09849749839bc29f779666e5d4df45cabdc0330438677f5a1093653443c1799b7018d06897ad8ecdb66886a74352b54e7288ff044da3404ca4860aea17906d74b69830d619c5409a95c8128056744b1ca20779ef42", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000001780), 0xffffffffffffffad) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:09:56 executing program 3: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x400, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x70, 0x7, 0x7, 0x9, 0x0, 0x0, 0x401, 0x400, 0xd, 0x5df4419d, 0x4, 0x7f, 0xffffffffffff8000, 0xe4, 0x7fffffff, 0x9, 0x7f, 0x9, 0x8, 0x3, 0x5, 0x3, 0x8, 0x40000000000000, 0x6e, 0x180000000000000, 0x7fffffff, 0x7f, 0x1000, 0xfff, 0x400, 0x8, 0x6, 0x3ff, 0xd6, 0x466, 0x3c, 0x0, 0x8, 0x5, @perf_bp={&(0x7f0000000000), 0x4}, 0x5, 0x6, 0x3f, 0x8, 0xffed, 0x800, 0x7}, r0, 0x4, r1, 0x2) add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) finit_module(r2, &(0x7f00000001c0)='trusted\x00', 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = getpgrp(0xffffffffffffffff) ioprio_set$pid(0x2, r4, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) munlockall() ptrace$pokeuser(0x6, 0x0, 0x7fffffff, 0xfffffffffffffffb) ioctl(0xffffffffffffffff, 0x0, 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x7fff) remap_file_pages(&(0x7f0000ff3000/0x4000)=nil, 0x4000, 0xa, 0x6, 0xe0000) creat(0x0, 0xffffffffffffbfd) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[{0x0, 0x0, 0xffffffffffffffc0, 0x6d}]}, 0x10) r5 = syz_open_procfs(r4, &(0x7f0000000340)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r5, r5, &(0x7f00000000c0)=0x202, 0x5a) 03:09:56 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:faillog_t:s0\x00', 0x1f, 0x3) setresuid(0x0, 0xee01, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) 03:09:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$revoke(0x3, r1) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:56 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="66e4e9", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:56 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x9, 0xfffffffffffffff5, 0x8000000000002}, 0xffffff3e) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x40, 0x42) ioctl$RTC_PLL_GET(r1, 0x80207011, &(0x7f0000000100)) 03:09:57 executing program 2: r0 = socket$inet6(0xa, 0x3, 0x3c) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) epoll_wait(r1, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x7fffffff) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r2, 0xc0184900, &(0x7f0000000040)={0xfffffffffffffff9, 0x20, 0x1, r0}) open(&(0x7f00000001c0)='./file0\x00', 0x80, 0x8) connect$inet6(r0, &(0x7f0000000080), 0x1c) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) 03:09:57 executing program 4: clone(0x3102001ffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) iopl(0x0) tkill(r0, 0x1b) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x14}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:09:57 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$void(r0, 0x5451) getpid() r1 = getpgrp(0x0) syz_open_procfs$namespace(r1, &(0x7f0000000040)='ns/user\x00') 03:09:57 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(0xffffffffffffffff, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x20000, 0x4) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x10) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:57 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000000100)='./file0/file0\x00', 0x20) ioctl$LOOP_GET_STATUS64(r0, 0x4c05, &(0x7f0000000380)) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)=ANY=[@ANYBLOB="66643d5b5c4b3572b88351e3d312ff1c510bc987f3bb2892aaa71b72fc55685d832d528da367546b47a3880f2c1fcf2669b8c6e4517f18dd916d3e44e5d59595320ac476913f55b37e8421ca4e", @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f7b1cbb11e62557a3525e9c36b8d7564669643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1148) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) r2 = getpgid(0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x7}, r2, 0x0, 0xffffffffffffffff, 0x0) r3 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x2, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = creat(&(0x7f0000000180)='./file0\x00', 0x0) write$cgroup_type(r4, &(0x7f00000009c0)='threaded\x00', 0xfffffc47) prctl$PR_GET_NO_NEW_PRIVS(0x27) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000080)={0x33, 0x6, 0x0, {0x4, 0x4, 0xa, 0x0, '/dev/fuse\x00'}}, 0x33) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) connect$unix(r0, &(0x7f0000001480)=@file={0x1, './file0\x00'}, 0x6e) 03:09:57 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x10000, 0x0) setsockopt$inet_int(r2, 0x0, 0x0, &(0x7f00000000c0)=0xff, 0x4) syz_execute_func(&(0x7f0000000100)="c4c16c5ce3660feff63667430f72e422c462fd249fdb1e00003e660f72d15dc483e978dbcbc48181edfa40dcb43111610000c4c37bf0c64466440f175300") setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r3 = dup2(r1, r1) openat$random(0xffffffffffffff9c, &(0x7f0000000140)='/dev/urandom\x00', 0x117000, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_int(r3, 0x0, 0x12, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_mreqsrc(r3, 0x0, 0x0, 0x0, 0x135) 03:09:57 executing program 4: r0 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000240)='./bus\x00', 0x0, 0x0) mmap(&(0x7f000052b000/0x200000)=nil, 0x200000, 0x7ffffe, 0x50, r0, 0xfffffffffffffffc) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 03:09:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup3(r0, r0, 0x80000) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x4, 0x7c6, 0x5, 0x9, 0xe, 0xd50000, 0xffc, 0x6, 0x3f, 0xffffffff00000000, 0x3, 0x6}) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) getsockopt$inet6_buf(r0, 0x29, 0x18, 0x0, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x104, r2, 0x1, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8b}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8000}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK={0x44, 0x4, [@TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f9a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}]}, @TIPC_NLA_NET={0x6c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xd35}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xb27a}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x44}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x8044}, 0x2227131b2f6f6069) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x109101, 0x0) ioctl$PIO_FONT(r3, 0x4b61, &(0x7f0000000100)="45b6f56c6bb7078931ce74b216b41fd9dc57dff3d0a135a9de137ac24268c16b3b82d7b5055cd917d160d052d3b46d1263c2b2ff3333a5ebf35352e5dc65f74cb1d35f1010") 03:09:58 executing program 2: r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x18}, 0x10) r1 = open(&(0x7f0000000040)='./file0\x00', 0x101002, 0x80) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000140)={0x800, 0x3, 0x20, 0xa43, 0x1, 0x8000}) fallocate(r0, 0x1, 0x6, 0x1d) r2 = socket$inet6(0xa, 0x3, 0x8) ioctl$UI_SET_SWBIT(r1, 0x4004556d, 0x8) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x7, 0x0, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r2, 0x8917, &(0x7f0000000100)={'syzkaller0\x00', {0x2, 0x4e23, @local}}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8000, 0x0) ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000180)=0x7) r4 = getpgrp(0xffffffffffffffff) fcntl$lock(r0, 0x25, &(0x7f00000001c0)={0x2, 0x0, 0x8, 0x2, r4}) 03:09:58 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) pread64(r0, &(0x7f0000001480)=""/4096, 0x1000, 0x0) getuid() write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) chroot(&(0x7f00000000c0)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:58 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000001480), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="e228b625f8cd3c4babc3dca646061db79580e17495f0b30b0286381ec2310d426ddee7f81aa47201a30b9ed032b35d77baf8c2dffe3cb9e646e510c1ff80e28758f8"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 968.750711] audit: type=1400 audit(1548644998.594:412): avc: denied { create } for pid=25413 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) fcntl$getflags(r0, 0x40b) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpu.stat\x00', 0x0, 0x0) fgetxattr(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1f289b3f085c97135b36ddf0fcddbf6052997bba8cf8af7f696b46505dbd2ca7edf74e287ca072dc7c1fb08e0211be650ee58a7e62dd677260ee48a9407d0116641be59d4c5ce68833d79f77e31b94c5ff7e18af2ccc83f8a62be8a48f1c24b29158ba0df7e11dbe2988bc7c22c9269378fa88094e2e13f15ebbab2a717372ef490781d988c76346f28de16ae24b2600314b4c576ce63c60d9e8609155"], &(0x7f0000001480)=""/195, 0xc3) ioctl$TIOCCBRK(r1, 0x5428) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 968.942512] audit: type=1400 audit(1548644998.794:413): avc: denied { write } for pid=25413 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:58 executing program 2: socketpair$unix(0x1, 0x2000000002, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) getuid() perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x40, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file1\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x8000011) fallocate(r1, 0x8, 0x0, 0x10000) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f00000001c0)={'broute\x00', 0x0, 0x3, 0x6e, [], 0x5, &(0x7f0000000080)=[{}, {}, {}, {}, {}], &(0x7f0000000100)=""/110}, &(0x7f0000000000)=0x78) 03:09:59 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f00000001c0)=@v2={0x5, 0x2, 0x12, 0x6, 0xc, "80151e6881285f984d4a2537"}, 0x16, 0x1) 03:09:59 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000080)=0x6) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x1, 0x1000000000000a, 0x6d, 0x20000000000011, 0x0, 0x0}, 0x2c) fcntl$getown(r2, 0x9) [ 969.438987] audit: type=1400 audit(1548644999.294:414): avc: denied { read } for pid=25413 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:59 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="d06414c7975284c851611ae3e55a97288dfd5fb81bfdae9f5abb7f6563ce6973bf4699ffffffff00000000e7dc2873724b8371ed6709b399e1a76c5ae63c36b7318835c3826045040000000000000031685387aeac3206e9e5"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 969.513450] audit: type=1400 audit(1548644999.364:415): avc: denied { create } for pid=25413 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 969.515669] audit: type=1400 audit(1548644999.364:416): avc: denied { write } for pid=25413 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:09:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="747275737465642e2b028f82c0d9e84cf97c7f0f4daf4fdf42b367486c5b08db72c7b51dcee7986a7fed041145c4000d456de54ac105d433dedb3fb664aebad8e10f143258578138cf19e5840349f5ebfd4cf25a1f14de5744cfbeabefad56850cb1a9794b973e995bdadbde9887050befe893bf7520"]) read$FUSE(r0, &(0x7f0000002480), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:09:59 executing program 2: r0 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RFLUSH(r0, &(0x7f0000000000)={0x7}, 0x7) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x80000000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fallocate(r0, 0x20, 0x0, 0x100000000) sendfile(r2, r1, &(0x7f0000000080), 0x0) 03:09:59 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) clone(0x1000000000011, &(0x7f0000001680), 0x0, 0x0, 0x0) waitid(0x2, 0x0, &(0x7f0000000fc0), 0x4, 0x0) [ 969.998681] audit: type=1400 audit(1548644999.854:417): avc: denied { map_create } for pid=25446 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 970.155035] audit: type=1400 audit(1548645000.004:418): avc: denied { map_read map_write } for pid=25446 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 970.362125] audit: type=1400 audit(1548645000.214:419): avc: denied { map_create } for pid=25446 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:10:00 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TUNSETLINK(r1, 0x400454cd, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 970.554609] audit: type=1400 audit(1548645000.404:420): avc: denied { map_read map_write } for pid=25446 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:10:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCSREP(r0, 0x40084503, 0x0) 03:10:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lsetxattr(&(0x7f0000000100)='./file0\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="73656375726974792e70707030235c003a24ede3b81d68530ec3908b93d0b74df2b951c00a001df9f693c9f3bfb914d45baf2fec2a4e5430bdd9a50b73a21f9ba4e05865ee6ec5fb3b64345313e74ef4437c317c44c20d8e9639a9178acea3"], &(0x7f0000000180)='/selinux/status\x00', 0x10, 0x1) r0 = socket$inet6(0xa, 0x0, 0xfffffffffffffffe) r1 = socket$netlink(0x10, 0x3, 0x8000000000000004) writev(r1, &(0x7f00007af000)=[{&(0x7f0000000000)="480000001400190a20ffff7fffffff5602113b850e1de0974881000000fe58a2bc4a03049164643e89720000de213ee23ffbf510040041feff5aff2b000000000000070000000000", 0x48}], 0x1) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x0, 0x0, r2, &(0x7f0000000280)="5c5434c4220a909b78c87d7436b93c4488ba15bd6bb5ed5710422aeab840b2f8567d9f") unlink(0x0) setsockopt$sock_linger(0xffffffffffffffff, 0x1, 0xd, 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$IOC_PR_RESERVE(r3, 0x401070c9, &(0x7f00000000c0)={0x4739894, 0x9}) 03:10:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) munmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000) setsockopt$inet_tcp_int(r1, 0x6, 0x82000000000002, &(0x7f0000000180)=0x195, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$TIOCMGET(0xffffffffffffffff, 0x5415, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x623b82a2) inotify_init() r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000000)={0x4, 0x4, 0x1}) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000200), 0x0) io_setup(0x7, &(0x7f0000000100)=0x0) io_submit(r5, 0x1, &(0x7f0000000780)=[&(0x7f0000000700)={0x0, 0x0, 0x0, 0x2, 0x6, r4, &(0x7f0000000640), 0x0, 0x1, 0x0, 0x0, r0}]) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f00000002c0)={'vcan0\x00', 0xbf5}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @loopback}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000000c0), 0x2ba) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000300)=""/223, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) geteuid() recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r1, &(0x7f0000002300)=ANY=[@ANYRES64], 0xff35) 03:10:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = getuid() getgroups(0x5, &(0x7f0000000180)=[0xee01, 0xee00, 0xee00, 0xffffffffffffffff, 0xee00]) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000340)={0xa0, 0x0, 0x6, {{0x6, 0x2, 0x9f2b, 0x6, 0x8, 0x8, {0x4, 0x4, 0x0, 0x80, 0x357c1700, 0x10000000000, 0x0, 0x694, 0x8, 0x100, 0x800, r1, r2, 0x6, 0x1c7}}}}, 0xa0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:00 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id\x00', @ANYRESDEC=0x0, @ANYBLOB="2c002858955d8787d8e6eeb21b1c0f593e6273c288e25ca0ccaca113613b87ef0b9ac0b69ef47e4c47a7967caad19b4d58e97e8daf9984505ecbf2efab8a45"]) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64\x00', 0x0, 0x121, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGPHYS(r1, 0x80404507, &(0x7f0000001480)=""/4096) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:01 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000003280)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c75643d4dda0952b75c05c18158337051e8ebb36e148726072de3a95df819e8c6a6acdb2d9cbb537a1673f97d8cdf3ac2f5ac102bb245bf65030ba25e07d2f5ee399a29fe5fccae2021c7ee3b2a2bc1fd09085be1b890f849084d602c8d243483a1a713753a28e6b9dfbb3fb62c77bceeabf4c3ade76d93572b40c51f2885955c7937f9341ac6dc74ababe25eb77262bbf01e00009b355ddadb611c9bc7562b52fc0cce2dafd4845e519775e933d6", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = socket$netlink(0x10, 0x3, 0x4) recvmmsg(r1, &(0x7f0000003180)=[{{&(0x7f0000000180)=@l2, 0x80, &(0x7f0000000080)=[{&(0x7f0000001480)=""/253, 0xfd}, {&(0x7f0000001580)=""/216, 0xd8}, {&(0x7f0000000380)=""/84, 0x54}], 0x3, &(0x7f0000001680)=""/178, 0xb2}, 0x9}, {{&(0x7f0000001740)=@isdn, 0x80, &(0x7f0000002dc0)=[{&(0x7f00000017c0)=""/144, 0x90}, {&(0x7f0000001880)=""/208, 0xd0}, {&(0x7f0000001980)=""/213, 0xd5}, {&(0x7f0000001a80)=""/4096, 0x1000}, {&(0x7f0000002a80)=""/89, 0x59}, {&(0x7f0000002b00)=""/218, 0xda}, {&(0x7f0000002c00)=""/249, 0xf9}, {&(0x7f0000000100)=""/25, 0x19}, {&(0x7f0000002d00)=""/140, 0x8c}], 0x9, &(0x7f0000002e80)=""/90, 0x5a}, 0x1f}, {{&(0x7f0000002f00)=@ll, 0x80, &(0x7f0000000200)=[{&(0x7f0000002f80)=""/109, 0x6d}, {&(0x7f0000003000)=""/121, 0x79}], 0x2, &(0x7f0000003080)=""/197, 0xc5}, 0x401}], 0x3, 0x10000, &(0x7f0000003240)) read$FUSE(r0, &(0x7f00000050c0), 0xfffffffffffffee5) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f0000000480), 0x1000) write(r0, &(0x7f0000000400)="18e2344888924a47ad5e8248122cf8d39d", 0x11) write$FUSE_INTERRUPT(r0, &(0x7f0000000340)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:01 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) close(r0) r2 = socket(0x840000000002, 0x4000000003, 0xff) connect$inet(r2, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) sendmmsg(r1, &(0x7f0000006d00)=[{{0x0, 0x0, &(0x7f0000000040), 0x2}}], 0xd3, 0x1ffffffe) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x101100, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000100)={r3, 0x0, 0x1, 0x3, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x8}, 0x20) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000100}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)={0xc4, r4, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1f}}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3ff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7ffe}, @IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x4}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x236c}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @broadcast}}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x7}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x80}, 0x40000) 03:10:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000180)='nv\x00', 0x3) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:01 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001480), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 972.070953] audit: type=1400 audit(1548645001.924:421): avc: denied { create } for pid=25497 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$P9_RMKNOD(r0, &(0x7f00000004c0)={0x14, 0x13, 0x0, {0x0, 0x3, 0x4}}, 0x14) openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) setxattr$security_selinux(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000180)='security.selinux\x00', &(0x7f0000000540)='system_u:object_r:devicekit_disk_exec_t:s0\x00', 0x2b, 0x2) mount(&(0x7f0000000a80)=ANY=[], &(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340), &(0x7f0000000440)=0xc) sched_setaffinity(0x0, 0x7, &(0x7f00000000c0)=0x9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000280)='./file0//ile0\x00', 0x4) r1 = getpid() perf_event_open(&(0x7f00000003c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x88120, 0x0, 0x9, 0x0, 0x7, 0x5, 0xffffffffffffc6fd, 0x727767d8, 0x8000, 0xf5, 0x1ff, 0x10000, 0x0, 0x1, 0x0, 0x8, 0x0, 0x2, 0x7fff, 0x9, 0xffff, 0x7f, 0x0, 0x7ff, 0x3, 0x1, 0x4, 0x100000001, 0x0, 0x1f, 0x0, 0x5, 0x2, @perf_config_ext={0x401}, 0x0, 0x0, 0x1, 0x7, 0x0, 0x10000, 0xa7}, r1, 0x5, 0xffffffffffffff9c, 0xa) rmdir(&(0x7f0000000240)='./file0//ile0\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@ipv4={[], [], @remote}, @in6=@ipv4={[], [], @local}}}, {{@in6=@mcast1}, 0x0, @in6=@local}}, &(0x7f0000000500)=0xe8) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0//ile0\x00', 0x0, 0x4) 03:10:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x0, &(0x7f0000000080)=""/187, &(0x7f0000000140)=0xffffffba) fsetxattr(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='os2.s\tstem$\x00'], &(0x7f0000000040)='-]-(ppp1S\x00', 0xa, 0x1) 03:10:02 executing program 2: io_setup(0x81, &(0x7f00000003c0)) io_setup(0x6, &(0x7f0000000100)) io_setup(0x5, &(0x7f0000000440)) io_setup(0x29, &(0x7f0000000500)) io_setup(0x201, &(0x7f0000000080)) ustat(0x7f3, &(0x7f0000000040)) syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') 03:10:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r2 = dup(r1) setsockopt$inet6_MRT6_DEL_MFC(r2, 0x29, 0xcd, &(0x7f0000000180)={{0xa, 0x4e21, 0x0, @mcast1, 0x8}, {0xa, 0x4e22, 0x5, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8000}, 0x2, [0xffffffffffff7de0, 0x3, 0x6, 0x5cd, 0x4, 0x34c6, 0x40, 0x2]}, 0x5c) 03:10:02 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001480)={{{@in=@empty, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) fstat(0xffffffffffffff9c, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000380)={0x78, 0x0, 0x6, {0x5, 0x9, 0x0, {0x3, 0x1, 0x2, 0x5, 0x7, 0x100000000, 0xffffffffffffffff, 0xa52, 0xc8, 0x5a1, 0x4, r1, r2, 0x20, 0x9}}}, 0x78) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000200)) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001580)='/selinux/commit_pending_bools\x00', 0x1, 0x0) read$FUSE(r3, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r3, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r3, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r3, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:02 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x10800, 0x0) mkdirat(r0, &(0x7f0000000380)='./file1\x00', 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-', 0x1}, 0x28, 0x3) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:03 executing program 3: creat(&(0x7f0000003500)='./file0\x00', 0x4) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000003300)='./cgroup.neyz0\x00', 0x200002, 0x0) recvmmsg(0xffffffffffffff9c, &(0x7f00000030c0)=[{{&(0x7f0000000040)=@ipx, 0x80, &(0x7f0000001340)=[{&(0x7f0000000100)=""/20, 0x14}, {&(0x7f0000000140)=""/82, 0x52}, {&(0x7f00000001c0)=""/196, 0xc4}, {&(0x7f00000002c0)=""/15, 0xf}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/61, 0x3d}], 0x6, &(0x7f00000013c0)=""/128, 0x80}, 0x9}, {{&(0x7f0000001440)=@nfc_llcp, 0x80, &(0x7f0000001b00)=[{&(0x7f00000014c0)=""/70, 0x46}, {&(0x7f0000001540)=""/78, 0x4e}, {&(0x7f00000015c0)=""/52, 0x34}, {&(0x7f0000001600)=""/204, 0xcc}, {&(0x7f0000001700)=""/74, 0x4a}, {&(0x7f0000001780)=""/133, 0x85}, {&(0x7f0000001840)=""/139, 0x8b}, {&(0x7f0000001900)=""/237, 0xed}, {&(0x7f0000001a00)=""/223, 0xdf}], 0x9, &(0x7f0000001bc0)=""/231, 0xe7}, 0x6}, {{&(0x7f0000001cc0)=@pppoe={0x18, 0x0, {0x0, @dev}}, 0x80, &(0x7f0000002240)=[{&(0x7f0000001d40)=""/155, 0x9b}, {&(0x7f0000001e00)=""/36, 0x24}, {&(0x7f0000001e40)=""/107, 0x6b}, {&(0x7f0000001ec0)=""/154, 0x9a}, {&(0x7f0000001f80)=""/112, 0x70}, {&(0x7f0000002000)=""/31, 0x1f}, {&(0x7f0000002040)=""/88, 0x58}, {&(0x7f00000020c0)=""/184, 0xb8}, {&(0x7f0000002180)=""/128, 0x80}, {&(0x7f0000002200)=""/32, 0x20}], 0xa, &(0x7f0000002300)=""/36, 0x24}, 0x5}, {{&(0x7f0000002340)=@hci, 0x80, &(0x7f0000002440)=[{&(0x7f00000023c0)=""/113, 0x71}], 0x1, &(0x7f0000002480)=""/165, 0xa5}, 0x647}, {{&(0x7f0000002540)=@ethernet={0x0, @local}, 0x80, &(0x7f0000002bc0)=[{&(0x7f00000025c0)=""/20, 0x14}, {&(0x7f0000002600)=""/149, 0x95}, {&(0x7f00000026c0)=""/211, 0xd3}, {&(0x7f00000027c0)=""/154, 0x9a}, {&(0x7f0000002880)=""/144, 0x90}, {&(0x7f0000002940)=""/70, 0x46}, {&(0x7f00000029c0)=""/4, 0x4}, {&(0x7f0000002a00)=""/143, 0x8f}, {&(0x7f0000002ac0)=""/217, 0xd9}], 0x9, &(0x7f0000002c80)=""/170, 0xaa}, 0x3}, {{&(0x7f0000002d40)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002dc0)=""/150, 0x96}, {&(0x7f0000002e80)=""/32, 0x20}, {&(0x7f0000002ec0)=""/114, 0x72}, {&(0x7f0000002f40)=""/69, 0x45}], 0x4, &(0x7f0000003000)=""/180, 0xb4}, 0x8}], 0x6, 0x0, &(0x7f0000003240)={0x77359400}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000003280)=0x16, 0x4) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000032c0)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r0, &(0x7f00000034c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40408000}, 0xc, &(0x7f0000003480)={&(0x7f0000003340)={0x118, r1, 0x400, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xba4c}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffff6a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}]}, @TIPC_NLA_BEARER_PROP={0x4}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}]}, @TIPC_NLA_BEARER={0x38, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ef}]}]}]}, 0x118}, 0x1, 0x0, 0x0, 0x80}, 0x20000001) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 03:10:03 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0xffffffffffffffff, 0xffffffffffffffff}, 0xffffff2e) [ 973.766792] audit_printk_skb: 18 callbacks suppressed [ 973.766802] audit: type=1400 audit(1548645003.614:428): avc: denied { read } for pid=25530 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001480), 0x1000) 03:10:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendto$unix(r1, &(0x7f0000001480)="c361b031c3ec3cab140833acb5e5eba5c74b978a5de0f597c64d0f20fc951e411c1611e31413ae8a513e4e7be3a1aad02f1a328eed39cd112afe6fe340e54e628c0fbffe0a634e1c0ca5010125612a759553a985acac9066ae3aa3d180d05c784c1d7ca471cd050dc7e495b8363f9754dafb16936d32172f09961e913107f33673e173a780e4ea401cc4134c317585f31db7d3233ae0", 0x96, 0x6dcd79c50743f83e, &(0x7f0000001540)=@abs={0x0, 0x0, 0x4e21}, 0x6e) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 974.049354] audit: type=1400 audit(1548645003.904:429): avc: denied { create } for pid=25530 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30033030303030303030303030303030303034303030302c957365725f69643d", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mkdirat(0xffffffffffffff9c, &(0x7f0000000500)='./file0/file0\x00', 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x190) write$FUSE_ENTRY(r0, &(0x7f0000002000)={0x90, 0x0, 0x2}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup3(r1, r0, 0x0) [ 974.185420] audit: type=1400 audit(1548645004.034:430): avc: denied { create } for pid=25550 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2000) symlinkat(&(0x7f0000000080)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f00000001c0)) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) [ 974.187650] audit: type=1400 audit(1548645004.034:431): avc: denied { write } for pid=25550 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 974.199743] audit: type=1400 audit(1548645004.054:432): avc: denied { associate } for pid=25528 comm="syz-executor4" name="ile0" scontext=unconfined_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=filesystem permissive=1 03:10:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x4, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x3ff) [ 974.471819] audit: type=1400 audit(1548645004.324:433): avc: denied { read } for pid=25550 comm="syz-executor3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:04 executing program 2: pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_procfs(0x0, &(0x7f0000000000)='net/fib_trie\x00') sendfile(r0, r0, 0x0, 0x100000080000000) 03:10:04 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_snmp6\x00') ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000340)={r0, 0x0, 0x7f, 0x100000000, 0x6}) recvfrom(r0, &(0x7f0000001480)=""/231, 0xe7, 0x20, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000200)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000140)=0x0) r3 = getpgrp(r2) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000001580)=""/240) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0xffffffffffffffff, r0, 0x0, 0x5, &(0x7f0000000180)='eth1\x00', 0xffffffffffffffff}, 0x30) setpgid(r3, r4) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x5, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000080)={0x3, 0x200, 0xfffffffffffffff7, 0x1, 0x7, 0x4}) fcntl$setownex(r0, 0xf, &(0x7f0000000000)={0x3, r1}) write$eventfd(r0, &(0x7f00000000c0)=0x3f, 0x8) 03:10:04 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0xfffffffffffffdff) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x40000, 0x0) getdents64(r1, &(0x7f0000000100)=""/36, 0x24) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:05 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x7fff) getrlimit(0x9, &(0x7f0000000040)) eventfd2(0x2, 0x80800) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x7f, 0x6, 0x6, 0xf8, 0x8}) select(0x32, &(0x7f0000000fc0)={0x20}, 0x0, 0x0, &(0x7f0000003000)={0x77359400}) 03:10:05 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) add_key(0x0, 0x0, &(0x7f00000003c0)="b14ddcf00e6ea64f5c8986d3b81cbded1e3f361b91edfc10996d73abdc741350e0d48c880093a2eea58897fe2f6d55a4c6d9a7e191edf61250374f5aa573f29d24248aa83664c9e3273bca9fe1e52e4aa404d2dd0448f8ed48ffc785fbc33af7b9db621e2130bdd09c5293702e9b0f437d2fc7166c96a7f40ea2fa7ccf30586c43fb03641ab2d1893d83f1396b8e4da44c643e3b806ff44377b355311bcfc9a15afa5a373854dddcded902aa0cf16b0c47ab4a2b94e3d415a369d57c2154155c3ff228d2bb68717b2ff0324c904eaceff8540e7793d21a105e0af91ecd85cfd496d62aef1a1c9def53eedc9d5300b2051d9a9cdeeec86e3e4d8226fc191e8f0cfc2432a7ab3f48b3faf55f94c7b8fe1855e3e697dff9018eaa1900c2371c5ad5f8dda4e0d4e87174888d3df13a246c7aca090bd2746102d87f509c1df627097ca87e659ba41dd74423171f5a41d14f5a27ce1d1b953d33ddfda82814ae9705cef0aa96e8dba7f424092aaae9b4826fa8082b6b72560de57ad6a6d4eda7fd0a595fed3de30558e7d15af256f45f3f180480eeb92213f347d4680f36552888333e9abeb09d3865798fa65e81edca525ee3ba86c413afa37c8f5e20d9c82115c6271927439866be30d9c6118851055643683097a990078a18041a9d0fe6d4a6aedbbfa1e245fe17c800d625ed3369b98ef698b5589bbdb90dd94c820101174ab7b5d65aeba54540fbfd1f92cffed569de80ccb2c4327298635d2655881d19c867c3d92f9054e98e217822babbccab21df4000940cdad2a573cd22daee957de6f6c89a85900bd55c7cdcdf534f7cda48cd10ec05875aaa2e16566b132741c46ccd00a704be2b893c8d8f67847ce1316b85230d26c627d6d7b88e927dd5875dc8d34f7c95b46c05f8fc8b026da5035afca2d13307cfcfd0fb6b3709a94dfb6851dc3c290a97ef87ddd76e0f32ae173b57d3d7436d9bb5e63052c28e6ee47db0054918bf1ca4e5446c7319e2f191076330584456e13eaf2e0db33e7bc18d57815ec2866333fcc343d81456870bd77b75224bfb3ffedd62b4f35b40b42b560802325be9f0f2ed90ef9b95ecb34f2c0df38256fe60208680881a559e66f50ff052eac61d73f5847f9ae314934e59a1196bc6b75f17e8a72427039e7f831cd988527af575172b8427f76f95c7bbff77429530eb136236647fd4449ac95f0650699a6955c9341fad329af2e2104bcaa7eefac38423e48e9b9e258bca37a96746b3fd8b417d01b2069a10474c401bcf6e10acc9429d59886828cd07d17cdb9e8a9b2a63794b4f98a373eda7408e4f28048ecdb8ab030a47262c2dbbbad41737475dae4025c382d955775ddb555cec395798001fad52432b8efaf32ae649bfb6de38056e8ab83294c4430815df0e31d2b5ed969a6242751c560fb78aac7c66be61ff03a861e5b9f09c15c82d82029e3518215a6016156fb5069d336c2af30c8d184e22b9aa7026a3b8ec3fb8f31bb0ee4615469653f7b51c868b0ab3e82e305e3f76c01aa17701f92da63cef0475a4704f4242e0718e2b6fc641e00549e249bd008f8c4de5c26e4edcaabfcf41b95c2e0426d279ea217cf85120cbfe500965d4e8c1b761875e5375e2842c4603edf26434f2d4dccc42110e8cd84083146f1a0a64ecf6a292dc22ea933d8449e4b1d02b1b65e3f8746551d6f34da203fdaca1776ac8fb9bb85308c972af68ba4a2159931979c8336433e948012b4f1569e8d9c1c1b561d36f2ae7f79794f3efb5e9b665b93934a83fbec00163953f734de8b87ece1e3e72d68b4d0c0cdeec8ff9bcaf15d59c57d680a45355a582461bef117082b2c926a478d632149a4b0aa6860de59e957b7f7bfd00516452e7f9f3f76edc3e45c873081cb62bb1e0c9641e0a703a07d9b4990b16e176de5ce1999730b8a1fb7852759dc962801900b6dc75f1fd3176caf312e34b45e3f4cf65c4156da8af6c1e571099965d170078ec04df919f6207ed54886ec19e46fa990a87cbc68609cbed866cca51e46d95358448d54ad06e924cfa1de2b6f513876967821e1343b72094b5ce38c2a885fe098d40841449774965658c7fbe9de1a367983b33f2f4899f4716050ab165e5f0e311739b5684b848d26d7fa470c8b24f1f649cc46b91884100e49cadf48e566375513c80029c11bc0d9bd6ea76e1d373383a99a76310f3f77283dd7d9a027ea8cc035d9c77dc4bc81bb2e8d4f7bc01c10f8d75f1f046c3c4d79be90a342f9416a85bfdd9022941922bdc62d64b92d381c19753109b712e9c07dd5dfaf1cfd112f3240f1b99ceedba1cd3b38cb3391787b634220769fe8a49c4edadbc5371e89be10f1eb8301d97f58265ed64914c7a9d8c82a0ec0ec2fda17dae6f2ae6c29873a0d5fa8c406bf7590d3067de587d5334d7158991b8948d6e21d94703a42444ef312936c3d87072bb46672fb85a3ea1d71ed58b918e791d5f0a1cc613de1112c42894de3f20e459be911bf3d14dc27372c92394870a718e1d34c810128093b3468da4ae80763cbca3a6e3dc111345654ab018553a2ca4147b8508378f3d7eab4623a1f5e4c9bda40c703bb741b0834b7fd41b19c784509d0c7e7c8557", 0x73e, 0xfffffffffffffffe) fchmod(r1, 0x10) setgroups(0x3db, &(0x7f0000000100)) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f00000000c0)={@mcast2, 0x0}, &(0x7f0000000100)=0x14) fstat(r1, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@rand_addr=0xebdc, @in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4e20, 0x8, 0x4e21, 0x3, 0x2, 0x80, 0x80, 0x33, r2, r3}, {0x1, 0x5, 0xb347, 0x0, 0x1, 0x6, 0x7, 0x7f}, {0x2, 0x0, 0x0, 0x3}, 0x1, 0x6e6bbd, 0x0, 0x0, 0x3}, {{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x4d3, 0x2b}, 0xa, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3501, 0x0, 0x2, 0x2dc, 0x8000, 0xfa46, 0x5}}, 0xe8) getsockopt$inet6_tcp_buf(r0, 0x6, 0xf, &(0x7f0000000040)=""/61, &(0x7f0000000080)=0x3d) sendfile(r1, r0, 0x0, 0x1) 03:10:05 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000040)='./file1\x00', 0x68bd, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000280)={0x1, 0x0, 0x11, &(0x7f0000000240)="fe080000000000e1d2017521e449a5c5a3"}) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) 03:10:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="bb715a79073001562830c684abf2c569706f4676f82d05312986b1f52de01b4d97b4997af9ba1cc254d789100bc4eb493a75327fa02ae0f4d6ec1a8e2d1ae084ba88384c1b1f7ab1a8ea7eb3720adbc08203036928cac8bfc348299550d5b54c09bf0fb8ee6fe48f0fbc084ea861"]) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\t\x00\x00\x00 \x00\x00\x00\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) init_module(&(0x7f00000000c0)='{.\x00', 0x3, &(0x7f0000000180)='\x00') read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x4, 0x2}, 0x10) 03:10:05 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @dev}, &(0x7f0000000100)=0x10, 0x800) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000180)=0x80000000, 0x4) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2cfdffffffffffffff00", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:05 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) r1 = geteuid() quotactl(0x7, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)="bfcf30523adb4b8ba6b1692d89d90c4fdd91b26303c40e1f52ef9196439e2d726fd987a5099b0c8dbbacbb62e100ded614feab9663eb57b1a5dea31a") read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:05 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x80, 0x0) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000140)=""/194) close(r0) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000100)='ip_vti0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0x30, 0x0, 0x0, 0x120) 03:10:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = dup(r0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000280)='nbd\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x381100, 0x2) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r5 = accept4(r0, &(0x7f0000000340)=@can, &(0x7f00000003c0)=0x80, 0x800) r6 = syz_open_dev$mice(&(0x7f0000000400)='/dev/input/mice\x00', 0x0, 0x40) r7 = openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x40, 0x0) r8 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/policy\x00', 0x0, 0x0) r9 = accept4(r0, 0x0, &(0x7f00000004c0), 0x80000) r10 = dup3(r0, r0, 0x80000) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f00000005c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x7c, r2, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@NBD_ATTR_SOCKETS={0x44, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}, {0x8, 0x1, r10}]}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x3}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x40000000400}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x2}]}, 0x7c}, 0x1, 0x0, 0x0, 0x80}, 0x0) r11 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r11, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) r12 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r12, 0x29, 0x20, &(0x7f00000000c0)={@mcast2, 0x8, 0x0, 0x0, 0x0, 0x3ff, 0x9}, &(0x7f00000001c0)=0x20) r13 = socket(0xa, 0x400000001, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r13, 0x0, 0x2a, &(0x7f0000000100)={0x6, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_mreqn(r11, 0x0, 0x13, &(0x7f0000000740)={@multicast2}, 0xc) setsockopt$packet_int(r12, 0x107, 0xf, &(0x7f0000000200)=0xffffffff, 0x4) socket$inet(0x2, 0x4, 0x3) 03:10:06 executing program 4: keyctl$set_reqkey_keyring(0x5, 0xfeffffffffffffff) r0 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000001c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$describe(0x6, r0, &(0x7f0000000000)=""/49, 0x31) keyctl$describe(0x6, r0, 0x0, 0x0) 03:10:06 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x3080045, &(0x7f0000002600)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYRESOCT=r0, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYPTR64=&(0x7f00000015c0)=ANY=[@ANYRESDEC=r0, @ANYRESDEC=r0, @ANYBLOB="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", @ANYRES16=r0]]) read$FUSE(r0, 0xfffffffffffffffd, 0x731) lgetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="6f730b7373cb25b9da35b22977bc5c5858833d86fec6e251ac3fb9350c4e4b71b63ec4d2447c2066ce9991b238287d503b5985e5"], &(0x7f0000000180)=""/191, 0xbf) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) r1 = getpgid(0xffffffffffffffff) sched_setattr(r1, &(0x7f0000000100)={0x30, 0x1, 0x1, 0x0, 0x7ff, 0x3, 0x9, 0x6}, 0x0) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:06 executing program 3: bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) [ 976.516468] audit: type=1400 audit(1548645006.364:434): avc: denied { create } for pid=25621 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="d0f901ce77b3127b1874"]) read$FUSE(r0, &(0x7f00000040c0), 0x1148) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x100000000004, 0x32, 0xffffffffffffffff, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r1, 0x107, 0x0, 0x0, &(0x7f0000001040)) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:06 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000180)=0xc) ioprio_get$uid(0x3, r1) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="6683c260f6ef22da1030144357f13cc4643d", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000037774,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f7570ba12c48f", @ANYRESDEC=0x0, @ANYBLOB=',max_read=0x0000000000000000,allow_other,max_read=0x0000000000000001,default_permissions,max_read=0x0000000000000007,max_read=0x0000000000000008,\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x3, 0x2}, 0x10) [ 976.771614] audit: type=1400 audit(1548645006.624:435): avc: denied { write } for pid=25621 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:06 executing program 4: syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x0) flock(0xffffffffffffffff, 0x2) ioctl$void(r0, 0xc0045c78) flock(0xffffffffffffffff, 0x7fffffffffeffffd) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/148, 0x94}], 0x1, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000300)='net/arp\x00') ioctl$TUNGETIFF(0xffffffffffffffff, 0x800454d2, 0x0) preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f00000001c0)="4a80655cc17777a825bfd14936d0b03cfa94d1d1c3659b22bed0beb3dff987318f4c3c99589553317bb321f099391c88411102d434e9b9a5c1b061e9e3dab2de346b179200ef324e5942bd1e200767cc6438961c11956696be0f4f94259b9fee79", 0x61}, {&(0x7f0000000340)="b4091ab3f2ba57a4b29584b00427c948e6380ce6da5b9e70ee44b13bd8b1526589488bd98a8af77b3477fbaf51ed09a5822822889ded3c134195c9f755623e01da66de50f51bb92b4e05ac48352a57511ea8812b0471a2e2650db5a19916fb2158455169a904eefdf06e83dacb5ffd09a98f2e62bc28989a0d73bc8620dc79f1445763726e49ac35c7f3c12dbf9df19eba00fa3cb4132b3deae725451d2d3f06b623b2108c633d38871745862c89637acfca455ce0ad869ada4d11b2eefc66a5b61dc50bc9476e3aab4e9efd669abc05da894c17ded73d4ba24786155d5c97", 0xdf}, {&(0x7f0000000240)="aaa8063e96a947be6befdd983b7b3ad2d5808769becc8338265cec9e8487e8924d1b0af0d56004df695863b61fbf39ff3ee4821ad282cd6d7e7612f9d2ba79208359db4e9026c29563d6a3ffa627912c6f0fd1ae39db2d46a548c5cd0a094cf02568383781b10939b68c8c1856f8d1e3558058831eb6c2853237", 0x7a}], 0x3, 0x0) r2 = gettid() ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)=0x0) rt_tgsigqueueinfo(r2, r3, 0x14, &(0x7f0000000140)={0x3c, 0xa60, 0x4}) 03:10:06 executing program 3: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff034}, {0x80000006}]}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 03:10:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) syz_read_part_table(0x3b5f, 0x5, &(0x7f00000016c0)=[{&(0x7f0000000180)="abe44e2c95ab06c285d4a187837a3bb7cf69de3049a850f57557a348c52d961705dfd21428cec87bbb20d527032f79b38d8773591f268f50087c23589bb34fa708a6ecc6f0ae5660709616a9934500952d960d543488daa8633368bcd83280706b4b76a745105955f9ec018b315b120c6458d123ffe08a4e8aca00373954e094dfcd6dbb98603a6b33003c3fd76bb5e6b2169e61c0b1248641817ac5", 0x9c, 0x359a5635}, {&(0x7f0000001480)="732d8ab06b9ff55e651a29500a6e967ad17cf21179c7d2682f2aa816bd148887115a3ff9055b1826cc7d1bc3f3632960cde561667f3bdeb89f51fe147c8d1fb5b5120ae1f6f830002b8636faa2b83be079456109e1d45b42d3f5ff853fd90ee8a83df8d46df71c260d4544d6384c3bbe17228696f500cb9124ebeaaac0de88c5984e8e2c1d5cbfb17a86df54eed75f0e0886f5f5b9feb42b82bc886f43006fdd6389b82d8cafe251213ce7e0045b00336639893c28d276ba013907009dba385a9ae49d9f41903978027badc3872709c6f99b9a1ce3d52c35ce", 0xd9, 0x8}, {&(0x7f0000000380)="54f40fe92ad379575fc8af3b9e096019846a09c4d1376c33550bf6221ad48c7f699d80a9c5e1f01f25bccc85983517a202ebe5e709c3221de463e00ca1b6ad4fafdecb3d832f0696", 0x48, 0x8f0}, {&(0x7f0000001580)="c450fbebb49e0c0551407d1ee438ed69f28af7e836e307309d32562a446ed2742de2238231446a6c648edce13e7b0c87b87bd10da8b0d525c5d214684ee11d7cdda664b59299fb0d9991b9b06c9c1c3af5a39fb25ae0e6dd5f93e83b481985c00f2731e258facecee8022c223f055756eb24753a3b8a75ff3d6f21a9b6ea87f11f72cb3e317efc058b1475af62c2b83adb11c0a30d2d8a6b18384a460a2dd0f188e6646f26507de14dc1ec55ef84811971c120", 0xb3, 0x38000000}, {&(0x7f0000001640)="475051d0186784dd23215f05b4752c4d60c08a1a81b35817380260eb194b57a2af35e29d063c81f861618a713274cba98e6d9ceeed701864d52f823d34040c8141fcda79", 0x44, 0x1ff}]) [ 977.297338] audit: type=1400 audit(1548645007.144:436): avc: denied { create } for pid=25621 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 977.344095] audit: type=1400 audit(1548645007.194:437): avc: denied { read } for pid=25621 comm="syz-executor2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:07 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/mls\x00', 0x0, 0x0) memfd_create(&(0x7f0000000500)='/selinux/avc/cache_stats\x00', 0x0) r3 = openat(r1, &(0x7f00000001c0)='./file0\x00', 0x0, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x394) setsockopt$inet_tcp_int(r0, 0x6, 0x10000000013, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x14, &(0x7f0000000340)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10) sendto$inet(r0, &(0x7f0000000400)="b5", 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000080), 0x14) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000380)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r2, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x24, r4, 0x100, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x4}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0xc010}, 0x40000) recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000001d80)=@hci, 0x80, &(0x7f0000000240)=[{&(0x7f0000000280)=""/191, 0xbf}], 0x1}}], 0x4000000000000d4, 0x6, 0x0) 03:10:07 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x8) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x1) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000001480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:07 executing program 4: r0 = fcntl$getown(0xffffffffffffff9c, 0x9) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r3 = socket$inet6(0xa, 0x3, 0xff) ioctl$TIOCSWINSZ(r2, 0x5414, 0x0) mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x13, r1, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000640)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6}}, &(0x7f0000000740)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000780)={@mcast1, 0x64, r4}) r5 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$inet6(0xa, 0x80005, 0x9) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000280)={0x9, 0x1, 0x8, 0xfff, 0x10}) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f00000002c0)=0x54) connect$inet6(r6, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$inet6_opts(r6, 0x29, 0x3b, &(0x7f0000000140)=ANY=[@ANYBLOB="000204be710f0100000000ff01df10000000000000000000106b6cbca60ad6aa9f3caddcecc9d771c9c7b90a33348cd419179f6f1d6f4cbad596c582c05fc891c37d80a5703a04b1e7a98cd20a7def93ce1936406b77a6b2c30634216c0dabf7d512fefd4bc3d60aa7a65820b57042f4fcf2b17afb3f59b3f49d337521f1be6f47ed83b40cecc8a3b55a8c11f8a4a05077558c31b998a30a6bbceaf5bf8714ce06a332c5450a3c38740075739842ba92a616c37bc9518fcc5ae394130a815cea1b9fb286e37787cca74ca8272fd4e2f70a02eb96483ab027d14b4635375e8c1a653e11e2d88933de4aca9f38a051d192458970417fa5d73d3d4de3ae50fc9c67dd565f00e3a286f108"], 0x18) sendmmsg(r6, &(0x7f00000092c0), 0x4ff, 0x0) sendmmsg(r3, &(0x7f00000002c0), 0x1f5, 0x20007ffc) 03:10:07 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) fcntl$setpipe(r0, 0x407, 0x81) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x100, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x3f, &(0x7f0000000280)=""/126, &(0x7f0000000340)=0x7e) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000180)={0xfffffffffffffffc, 0x0, 0x4, {0x7, 0x1b, 0x4, 0x1, 0x0, 0x0, 0x76}}, 0xfffffffffffffd7f) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r2, 0x8934, &(0x7f0000000100)={'ipddp0\x00', 0xe10c}) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$TIOCMBIC(r1, 0x5417, &(0x7f0000000380)=0x8df) 03:10:08 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:08 executing program 3: clone(0x3102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xc) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000080)='/dev/keychord\x00', 0x101100, 0x0) write$P9_RREAD(r1, &(0x7f00000000c0)=ANY=[], 0xfffffffffffffd73) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:10:08 executing program 2: unshare(0x400) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x847fe) timerfd_gettime(r0, 0x0) 03:10:09 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100012}, 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x1c, r2, 0x102, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x4000090) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:09 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000004540)=[{{0x0, 0x0, 0x0}, 0x7}], 0x1, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x52800, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0x0, r0, 0x0, 0x6, &(0x7f0000000280)='vlan0\x00'}, 0x30) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000540)=0x0) sched_setaffinity(r1, 0xfffffffffffffc83, &(0x7f00000005c0)=0x3) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, 0x0) close(r3) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'vlan0\x00', 0x1000e806}) r4 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r5 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(r5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="000000002aa878482abd7004fddadf250a3f01fe", @ANYRES32=r7, @ANYBLOB="00000200ff02000000000000000000000000000100000600080000000104000068b20000ff010000000006000100008005000000000200000200000000000200000000000000000000000000000000010000080001030000"], 0xffe4}}, 0x0) ioctl$FS_IOC_SETFSLABEL(r4, 0x41009432, &(0x7f0000000340)="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") clone(0x802122001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = gettid() clone(0x2e828903, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r8, 0x0, 0x0) tkill(r8, 0x8000000000000014) wait4(0x0, 0x0, 0x0, 0x0) ftruncate(r3, 0x2007fff) sendfile(r3, 0xffffffffffffffff, 0x0, 0x800000000024) creat(&(0x7f0000000200)='./bus\x00', 0x0) getuid() fallocate(r5, 0x34, 0x5, 0x9886) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ptmx\x00', 0x1fffd, 0x0) writev(r9, &(0x7f00000023c0), 0x1000000000000252) 03:10:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="43a375d7db7d3b83e69dfe5f3c5d75e2117ddc5f1717d18df5e2113a827ea17cde7d6afa20008fa2051f62e2842e455e47e5b8d02c03b94bb85f00000000000000037d4830925f27e36e00000000000041dcc360b06e79e53fd1d01100000000000000", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:09 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') write$uinput_user_dev(r0, &(0x7f0000000040)={'syz0\x00', {0x64, 0x0, 0x8, 0x5d}, 0x50, [0x8, 0x9, 0x28c, 0x80000001, 0x1, 0x4, 0x2, 0x9, 0xd26, 0x4, 0xfffffffffffff36a, 0x433f, 0x1, 0x3f, 0x101, 0x3, 0x400, 0x44b2, 0x10000000000, 0x8, 0x401, 0x401, 0x8, 0x5, 0xf72, 0x7, 0xca, 0xfff, 0x8, 0x4, 0x20, 0x6, 0x8, 0x3, 0x8, 0x59d3, 0x9, 0x5, 0xe0, 0x0, 0x1000, 0x3cc, 0x3, 0x5, 0x0, 0x101, 0x4fa, 0x8, 0x4, 0xc20, 0x999, 0xc063, 0x6, 0x2, 0x1, 0xfffffffffffffffa, 0x3, 0x81, 0x0, 0x7fff, 0x2, 0x7, 0x1, 0x1], [0xffff, 0x10001, 0x2, 0x7, 0x95, 0x7, 0xfffffffffffffffb, 0xaa, 0x5, 0x8, 0x2, 0x0, 0x5, 0x39fb, 0xffffffffffffff81, 0x727e4ab1, 0x116a, 0x7fff, 0x7, 0x5, 0x3ff, 0x9, 0xff, 0x5, 0x9, 0x1, 0x100000001, 0x8fc, 0x10000, 0x1, 0x2, 0xffff, 0xfffffffffffffffa, 0x9, 0x4, 0x1, 0x8, 0x20, 0x8, 0x1, 0x8, 0x0, 0x58, 0x4a3, 0x4, 0x8, 0x3, 0x4, 0xfffffffffffffffc, 0x7, 0x8000, 0x0, 0xf594, 0xffff, 0x3b00000000000000, 0x5, 0x6, 0xffffffff80000000, 0x6, 0x3, 0x7, 0x3, 0x8000, 0x40], [0x9, 0x2, 0x1, 0x1, 0x3, 0x3, 0x0, 0x3, 0x7, 0x5, 0xef0, 0x1, 0xffffffffffff8000, 0xac06, 0x80, 0x9, 0x3, 0x8, 0x2, 0x9, 0x5, 0x5, 0x7fff, 0x1000, 0xffff, 0x344a, 0xff, 0x3, 0x882, 0x3, 0x1, 0x7f, 0x8, 0xfffffffffffffff9, 0x9, 0x8, 0x9, 0x5, 0x8, 0x2, 0x9, 0x80, 0x6, 0xaf, 0x9, 0x3a1, 0x8, 0x2, 0x0, 0x24c, 0x5, 0xffff, 0x8, 0x8, 0x1, 0x8, 0x1, 0x100000000, 0x1, 0x8, 0xa73, 0xe1, 0x1f, 0x5], [0x7fff, 0x2, 0x100, 0x7, 0x9f72, 0x80000001, 0xfffffffffffffff8, 0x3ff, 0x2, 0x5, 0x100, 0x6, 0x81, 0xf04, 0x6d92, 0x7, 0x25c3, 0x200, 0x41a, 0x4, 0x20, 0x5, 0x8, 0x8, 0x60b2bbdb, 0x4, 0x3, 0x5, 0x9, 0x5, 0x8001, 0x3, 0x401, 0x3, 0x1, 0x8001, 0x46, 0x100, 0x2b, 0x3, 0x6, 0x5, 0x1, 0x9, 0x3, 0x0, 0x0, 0xfffffffffffff10b, 0x7, 0x23, 0x1, 0x16e, 0x80000001, 0x2, 0x3, 0x8000, 0x4, 0x6a, 0xffffffff, 0x9, 0x3, 0x8, 0xfff, 0x90f]}, 0x45c) write$P9_RMKDIR(r1, &(0x7f00000004c0)={0x14, 0x49, 0x1, {0xbc, 0x2, 0x8}}, 0x14) lseek(r1, 0x0, 0x2) 03:10:09 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000000400)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000440)={@remote, 0x36, r2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/net/tun\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000080)=0x3ff, 0x4) prctl$PR_GET_TSC(0x19, &(0x7f00000000c0)) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'veth0\x00', 0x201a}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x0}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100)='tls\x00', 0xfffffffffffffd0c) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={@rand_addr="489592572ca0aed6de1b4bc6da12572c", 0x0, r4}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @rand_addr="d214c0e12eb5e6ea076cca63e0537907"}, 0x1c) dup3(r1, r0, 0xfffffffffffffffe) 03:10:09 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000 0000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x3, 0xfffffff7fffffffe}, 0x10) accept4$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000200)=0x1c, 0x80800) [ 979.960815] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43050 sclass=netlink_route_socket pig=25726 comm=syz-executor4 [ 979.973449] audit_printk_skb: 12 callbacks suppressed [ 979.973504] audit: type=1400 audit(1548645009.824:442): avc: denied { create } for pid=25721 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:10 executing program 5: prctl$PR_SVE_GET_VL(0x33, 0xbb84) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$PIO_UNISCRNMAP(r1, 0x4b6a, &(0x7f00000001c0)="767ee837c66fb69ce664d35009205aedbd30fcbd9c11da6aa14efef2acd347d8ffb177cac7c344088dd728e814cf59b1c17f2885443e789768721b7444ce95481076cd21f98fa653a79327ddacd79e713b7f621b") removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) sendmsg$nl_route(r1, &(0x7f0000001480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@ipmr_getroute={0x1c, 0x1a, 0x308, 0x70bd2a, 0x25dfdbfb, {0x80, 0x34, 0x20, 0x9, 0xff, 0x7, 0xc8, 0x8, 0x400}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000040}, 0xc800) 03:10:10 executing program 2: mkdir(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r0 = open(&(0x7f00000000c0)='.\x00', 0x3, 0x4) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x3, 0xa461, 0x9, 0x1ff, 0xe, 0xb85, 0x604e, 0x9, 0xbb3}) renameat2(r0, &(0x7f00000003c0)='./file0\x00', r0, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x2) [ 980.109187] audit: type=1400 audit(1548645009.874:443): avc: denied { write } for pid=25721 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 980.412684] audit: type=1400 audit(1548645010.264:444): avc: denied { create } for pid=25732 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 980.414860] audit: type=1400 audit(1548645010.264:445): avc: denied { write } for pid=25732 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syslog(0x3, &(0x7f00000000c0)=""/147, 0x37a8ec531be3c41f) r2 = open(&(0x7f0000000e00)='./file0\x00', 0x0, 0x104) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(&(0x7f0000000240)=ANY=[], &(0x7f0000026ff8)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, &(0x7f00000002c0)) getresuid(&(0x7f0000000000), &(0x7f0000000080)=0x0, &(0x7f0000000180)) r4 = getgid() write$FUSE_CREATE_OPEN(r2, &(0x7f00000002c0)={0xa0, 0xfffffffffffffff5, 0x7, {{0x5, 0x2, 0x52eb, 0x101, 0x8, 0x2, {0x6, 0x7, 0x800, 0xfffffffffffffff9, 0x3, 0x10000, 0x2, 0x5d7, 0x6, 0x6, 0x8, r3, r4, 0x9, 0x2}}, {0x0, 0x2}}}, 0xa0) r5 = syz_open_procfs(0x0, &(0x7f0000000280)='mounts\x00') accept4$packet(r5, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000380)=0x14, 0x0) connect$packet(r5, &(0x7f00000003c0)={0x11, 0xf8, r6, 0x1, 0x39, 0x6, @random="db3abc952304"}, 0x14) sendfile(r1, r5, 0x0, 0x800000080000002) fcntl$setstatus(r0, 0x4, 0x40000) write$FUSE_GETXATTR(r5, &(0x7f00000001c0)={0x18, 0xfffffffffffffffe, 0x7, {0xffffffffffffffc0}}, 0x18) rt_sigprocmask(0x2, &(0x7f0000000540)={0x1}, 0x0, 0x8) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, &(0x7f0000000400)={0xcadd, {{0xa, 0x4e20, 0xfffffffffffffffa, @rand_addr="0689c5343a562a5220e7f99687702bdb", 0x8}}, {{0xa, 0x4e22, 0x100000001, @empty, 0x4}}}, 0x108) 03:10:10 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write(r0, &(0x7f0000000180)="b70f7458361300ad71ceb51be86468584facd91affa47408985e1561712bd01749066476c3725971c68851a74df0e593a56df9e20f41033331daa181523445479ae69611b0db", 0x46) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r1, &(0x7f0000000480), 0x1000) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 980.558193] audit: type=1400 audit(1548645010.404:446): avc: denied { create } for pid=25721 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 980.561075] audit: type=1400 audit(1548645010.414:447): avc: denied { write } for pid=25721 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:10 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$TUNATTACHFILTER(r2, 0x401054d5, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000000)=[{0x80000006}]}, 0x10) pread64(r1, &(0x7f0000000280)=""/213, 0xd5, 0x62) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) write$binfmt_elf64(r0, &(0x7f0000001640)=ANY=[], 0xf5aab446) 03:10:10 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x10, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b, 0x8000, 0x4000000000000000, 0xfffffffffffffffc, 0x1000000000, 0x0, 0xfffffffffffffffe}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) read$FUSE(r0, &(0x7f0000001480), 0x1000) unlink(&(0x7f00000001c0)='./file0\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) [ 980.670855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43050 sclass=netlink_route_socket pig=25735 comm=syz-executor4 [ 980.689927] audit: type=1400 audit(1548645010.514:448): avc: denied { read } for pid=25721 comm="syz-executor4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 980.788970] audit: type=1400 audit(1548645010.644:449): avc: denied { read } for pid=25732 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f00000000c0)={0x10, 0x0, 0x2}, 0xffffff99) [ 981.049941] audit: type=1400 audit(1548645010.904:450): avc: denied { create } for pid=25732 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 981.051895] audit: type=1400 audit(1548645010.904:451): avc: denied { write } for pid=25732 comm="syz-executor0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:12 executing program 4: r0 = gettid() r1 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000200)={0x0, 0x0, 0x6, 0x0, [], [{0x8, 0x5, 0xfffffffffffffffb, 0x54, 0x4, 0xdb}, {0x90, 0x7f8, 0x5, 0x3, 0x8, 0x3}], [[], [], [], [], [], []]}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0xffffffffffffe1be, 0x9b, 0x8, 0x8001, 0x0, 0xb7, 0x8, 0x1, 0x100000000, 0x84db, 0x3, 0x400, 0x0, 0x56b4, 0x5, 0x3, 0x100, 0x563, 0x19b, 0x80000001, 0x100000001, 0x3000000000000, 0x3, 0x3, 0x6, 0x81, 0x1, 0x3, 0x7, 0x14df, 0x7ff, 0x8, 0x3, 0x9, 0x842a, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x9, 0x7}, 0x40, 0x0, 0x10001, 0x0, 0x8, 0x3, 0xffffffffffffffff}, r0, 0xc, r2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) rt_sigqueueinfo(r4, 0x15, &(0x7f0000000080)) 03:10:12 executing program 2: getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x14, 0x0, &(0x7f0000000000)) r0 = perf_event_open$cgroup(&(0x7f0000000080)={0x1, 0x70, 0x81, 0x5, 0x2, 0x81, 0x0, 0x72f4, 0x80020, 0x2, 0x80000001, 0xa52, 0x7, 0x1, 0x7, 0x0, 0x3, 0xfff, 0xfc00000000000000, 0xb3, 0x3, 0x44b, 0x7, 0x3ff, 0x101, 0x4, 0x10000, 0x0, 0x4, 0xdb, 0x6, 0x3ff, 0x7e61, 0x3ff, 0x10001, 0x0, 0xfffffffffffffeff, 0x4, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f0000000040), 0x8}, 0x0, 0x2e6, 0x9, 0x1, 0x4, 0x7fffffff, 0xa2}, 0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x1) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BLKRRPART(r1, 0x125f, 0x0) r2 = getegid() fstat(r1, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x3, &(0x7f0000000bc0)=[0xffffffffffffffff, 0xee00, 0xee00]) setgroups(0x5, &(0x7f0000000c00)=[r2, r3, r4, r5, r6]) fcntl$notify(r1, 0x402, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getrusage(0xffffffffffffffff, &(0x7f00000002c0)) r7 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r7, 0x6612) setxattr$trusted_overlay_origin(&(0x7f0000000a00)='./file0\x00', &(0x7f0000000180)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r7, 0x0, 0x60, &(0x7f00000004c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001801000000000000000000000000000000000000000000000000000028004e4651554555450000000000000000000000000000000000000000000003ffff0000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c65000000000000000000000000000000000000000000000000ffffffffffff000000000000000000000000000000000000000000000000000000000008ac1414bb0f000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1414aaffffffff0f000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000"], 0x1) r8 = socket$nl_route(0x10, 0x3, 0x0) timerfd_create(0x0, 0x0) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x84003, 0x0) ioctl$LOOP_SET_FD(r7, 0x4c00, r9) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, &(0x7f00000009c0)) ioprio_get$uid(0x3, 0x0) ioctl$EVIOCSMASK(r9, 0x40104593, &(0x7f0000000100)={0x0, 0x39, &(0x7f0000000080)="b5bbd5e15c74bd6b4cd79b9da59e7e18d56a76e07b31cb4c595559a1d9aa02e6f6833339c3f4aeb16ea714b117cdeba08159f936565c3720ba"}) write$apparmor_exec(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="73656d7765a1a32900c425498262f8f4eec0364f1114ca559a87f43519aaa64d0c55508119d2a3505cc955ecc228990843dc010a7e3cf12bfdb77e9d65aa6a75959f0936ddc9efd2ebb2ea4d101e1a2875bba0503169724279f2e5ef89c063e1adecc41602ab08f8bce010efc4775275115e300c26732a00ffffffffffffffff0000000000000000000000000143939054ec2116dd3b8d7f63f32e4d2a70b35667ebefa31a"], 0x1) getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(r9, 0x29, 0x22, &(0x7f0000000a40)={{{@in=@loopback, @in6=@local}}, {{@in6=@mcast1}, 0x0, @in6=@dev}}, &(0x7f0000000200)=0xe8) ioctl$sock_inet_SIOCSIFFLAGS(r8, 0x8914, &(0x7f0000000240)={'sit0\x00'}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000100)=0xb24) 03:10:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40000, 0x120) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x3) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:12 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000002480)='fuse\x00', 0x80, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="2c643aaf17e2e3beba35c1a69b86d91a751e436c1f5f"]) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000001480), 0xffffffffffffffac) 03:10:12 executing program 3: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x40000004e1d, 0x0, @ipv4}, 0x1c) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x3a}, {}, {}, 0x0, 0x0, 0x8000000000000001}, {{@in=@multicast2, 0x0, 0xff}, 0x0, @in=@empty}}, 0xe8) getsockname$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) sendmsg(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000001640)=0x0) fstat(r0, &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getgid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000002740)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000002780)={{{@in6=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000002880)=0xe8) getgroups(0xa, &(0x7f00000028c0)=[0xee01, 0xee00, 0x0, 0xffffffffffffffff, 0xee00, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xee01]) r8 = gettid() getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002bc0)={{{@in6=@ipv4, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000002cc0)=0xe8) r10 = getgid() r11 = gettid() getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000005d80)={{{@in=@loopback, @in6=@ipv4={[], [], @local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000005e80)=0xe8) getgroups(0x9, &(0x7f0000002e40)=[0xee00, 0x0, 0xee01, 0xee01, 0x0, 0xee00, 0x0, 0xee00, 0xee00]) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000002e80)=0x0) getresuid(&(0x7f0000002ec0), &(0x7f0000002f00)=0x0, &(0x7f0000002f40)) stat(&(0x7f0000002f80)='./file1\x00', &(0x7f0000002fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000003040)=0x0) stat(&(0x7f0000003080)='./file1\x00', &(0x7f00000030c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000003140)=[0x0, 0xee01, 0xee01, 0xee01, 0xffffffffffffffff, 0xee01, 0xee00, 0xee00, 0xee00, 0xffffffffffffffff]) r20 = fcntl$getown(r1, 0x9) lstat(&(0x7f0000003180)='./file1\x00', &(0x7f00000031c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r22 = getgid() r23 = fcntl$getown(r1, 0x9) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005a80)={0x0, 0x0}, &(0x7f0000005ac0)=0xc) r25 = getgid() r26 = getpid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000005b00)={0x0, 0x0}, &(0x7f0000005b40)=0xc) getgroups(0x7, &(0x7f0000005b80)=[0x0, 0xee00, 0xee01, 0xee01, 0xee01, 0x0, 0xee00]) sendmmsg$unix(r1, &(0x7f0000005c00)=[{&(0x7f00000001c0)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f00000015c0)=[{&(0x7f0000000140)="078960dfd6fc684ccdeeb9eb581c16828ba4ee", 0x13}, {&(0x7f0000000240)="c6cb203204fe2e2f4bbf4fea09283f5c93a830e92bf4dc91118fbe724caf2d07af1cbbca010bd576ece8fc2d8465a9e53c55fdcfb97839f078ecc6f859f98d6fac3c714e37c6700db62b8d6342d63dd3b3b3907bbd980bd73d741fd985f76923f9d074cf1be0de59d4103ec3a2d5d7f164657289e20a7002", 0x78}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="1ffa525767b45e90e3cbc3796b994e04f4ca7bfb017d19e78b64109e350a07f67ff9f7bdd52aaf7034f9358ee6", 0x2d}, {&(0x7f0000001400)="4c56c4720399e4d9ed717b3e9e9b2508125ea891a1c4b1a703a0ca0c22557d5846444659051b73526d5f1e76d8eac4a5f143ac40e140c4c74349c6616604f8d87dae201895ef0bb183b52425fe811acb0c3add", 0x53}, {&(0x7f0000001740)="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", 0x1000}, {&(0x7f0000001480)="7f01ec98088a35f98d2b69ee95e64442c7731f4688ebb6614dc048895111c5ae81021f7f2a37651577e796ccdcd1c26f182b289e67838754b86c44e7f762db568b5ef383beceb234c4c2fbce1e95c500f4d6dd248f06e4b19c1237ca8462799b415bb0471ea1c103e7a279f4e68de53e3dd11db9cace05598456f6a483e0fab9177fcbba1716ad41b6ca751373d082566bd9d421ef3a765757e44f0bd9fddbe13cb77064733b02b2fb036018aabf3ad53731fd75ae804bedf5d77b2aad667be374efeda2805c11e3ca58b9fd0941577af551218b1c65a52c6df528f9a0a853a6e986f0ba3babac", 0xe7}, {&(0x7f0000001580)="c76bc17bbf07a849ca670d0be83382bcbdc2ba3fb0dc20e4d8a93753d834e46236bb5f7d9462dced608c6951cd2341b74624d881f5f02abc091a2fe3813e", 0x3e}], 0x8, &(0x7f0000002900)=[@cred={0x20, 0x1, 0x2, r2, r3, r4}, @cred={0x20, 0x1, 0x2, r5, r6, r7}], 0x40, 0x40001}, {&(0x7f0000002940)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000002b80)=[{&(0x7f00000029c0)="34edf32b2dce6ee7720a8a26b36ca13aca66b959b7ae18d9e88f308e81cc211b172a57", 0x23}, {&(0x7f0000002a00)="509330d0774884445f9e13cbd4a0a3c832f08cc0b34372007f7a667f87be3b9e11bf0583be2e466602694012b26dd07a822f52b655f1a8d2ba72530fbe66a731a14895f1d87d5f1041", 0x49}, {&(0x7f0000002a80)="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", 0xfc}], 0x3, &(0x7f0000005ec0)=ANY=[@ANYBLOB="20000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r13, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r0, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYBLOB="0000000020000000000000000100000002000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r22, @ANYBLOB="000000001000000000000000010000000100000038000000000000000100000001000000ba8112128b5e403bc580e34689e2d6ab4fb9565083504e3db04a1507329f676f752c9c4287f3167db8782cee38f16a2974ef6f2fe5194c5751441a449d346b7fbfe5a9d4ce3f513b25b6198e820dfabbee9f2c843ba93247de4718f32e8624a6835a9ce8c10e494572fce9bfc0cba1ac9d0825384f296471bdd5527587727177af537b31266471c999c7a80f1698448da6e32134cc99cfea237aea7fe0db50d76649b178eeadff7d4f10029d98b1fadddb8e5103da37e542bf3ad9a057112ebc69", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1], 0x138, 0x40001}, {&(0x7f0000003380)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f0000003500)=[{&(0x7f0000003400)="7cec9634e470f69ab67a78f6c18fd97ee21a0c7c10175c96478cddde2e4a8b066236a647f65793f9c3a5f9aef4e82e439268d9f4f8881f3a6084e4f51fdff9011eee05e2a0c7db0aed669bd49917f85c5d69ad68509171a8017b05894fab0be7dec65743073c906d36f2624a8713382d16729e1bba2d9e82c23e059330353749df6f2a3211533e119a1b947dc02a18d5c4a5630eda963c50228e8dc7b7ac79053933917da61d8ab9885be2e60b9a6443bd7acef853f7568ce6862b89b835238809c2e40368373dee3e3529da7f3a806e5e42f87cc96e5f99da4116ab", 0xdc}], 0x1, 0x0, 0x0, 0x40}, {&(0x7f0000003540)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003700)=[{&(0x7f00000035c0)="3980e4a97cd061b885c940703f2a49244e7891b63ec1c3c15b4fb02c955a70f0b3daa12195a08877e82cf15f282bd8f17c4ebb37d93c23ad50a8dc09e29f3e4bb6ac04e0b3c27aa80ffa298c08ce59224eb419d3ce831ee2c49f1efa8c7ce28018cb14393a29be4f0024f9e4481690d255270df44a64a9abce89b8a7429a9bee7d675607a55fb7a1750c6aeb6889ddaa0a3b20e9f15ea0a9dd3d658833899c28120a304d3f1190011e36e4df1e8ffca5a80c5b9d4d0458451a009d31238abf6d6fd52302d92b62dd3ceb3305e23fee6051610d1cee572ccd9b43afc8f278a018b50756f16f98f19a524a0a03a34bad135b8022f09355", 0xf6}, {&(0x7f00000036c0)="d629e2de", 0x4}], 0x2}, {&(0x7f0000003740)=@file={0x1, './file1\x00'}, 0x6e, &(0x7f0000004940)=[{&(0x7f00000037c0)="f6bd563b4f", 0x5}, {&(0x7f0000003800)="7d625c735227e2d91e867605ac7b6b45fa7c7d772c82d9c5cb866a412e8efac6365bd4e074b419e48108e6983abbb7b233", 0x31}, {&(0x7f0000003840)="4ee3b068e031edf5aaf5a4a607692a25aa6a707141a3320f92fb8124595e6cae00f9aa31c375ca781abb73229472ec61a31d0ba7fbf037ac67e6f2cea1fe2524af4d5e38587a476fba5fd497cc6f13e43019721198012ec13284682d8bbb1617edd1151a1b7d67ba0b7df616eb590e5575ac2fbead5ac1208aecdd2e719e33c6182a3f6a9998d09f35bb191b6d05d3f07cc84a8cd9ef0ba0d7dffe2ac18087df396744aea98bb6e7c7cb2dbc2071b8be8efc86cfa6a806919ee18e577c6224552d5b0b5a751441aed0c3670ac52b7b1c8ebbada391dc4481c4082711ba86254077bb5e1fc85cbba0df2bb5ebb459bf75f3f5f1385ea6c780edd8f30ad5c9bdfb9f3a9598dc1b98252bc7f8eca96dcd073bcab3122165fa2d66e91feecb55e2bbdbe82b34329cf2e23b2756f1140c390ed0969932a8aba2bbd743e74b1411c0a7987d5a2e544b9913b54a86301958ab2a046310d9e0687570fcc32d2dba1b232cb8ff9c90f35da04cbcbf014aada3872b5128fad46a1ca1619e539386e941811c49c011d8697ce379c8cc87791def058acdbd89f60b0fa53a8a9e44f6c67841f4da6e26eb36b62c70290a689b52d48bb72d7878d4b0c8c19ac6e55b2a61c87e145cdb01df15c0a9a3c3c16b4dc5ec37485806876e38b20075b4b202566a178c89397c12da712d20f34ab780c8296f8e7b31e7534fba1aa7c6a3837663fe0fdae265874b77b0637cf163cb4f1cfb997a71e96ff6227ea8054ff2d14965ecf80335bd88cfa9d077a14a20541a9c5127c835e2bdc24abaa9a19e5ea66c516d91846591a95b65b913edd04ad20a1da7e8f2345cb262dc373be4d3cf6cfdb97d3ce9f90db5cbf00ace5d1f65a0693597e440cd972870dd34266c33483de35aa91a528824fc59bd493494bc1d127528f8d6a2253a55670cc8a1284b60ba9b28774213b5d82cf6e271527e60995f351166d95d710d4c7fbfec64785ff59137f35769ec7888429394511882cd18bcfc4784701ef4c08b9aae3ad7e13390a0efddebf8b350729771200708513530cdce705c3d0709518409ecca7ccdf7d249e24248b14ec8e37695fdda70016e92d14097d4b6ce69deec56f120b7f41ad2f123cc7f20efa7ccf5c96b36c056d5125adb0f91671591f16b2c618614f966524765d42377673ff040dd8aa7764981ca139120ab2d07785a83e1ba0b8093daa83ddcdfe764e4916ff24b3ff7cf600f9bc759a7274b4424c3c1c8ed5505fbc309858f348a799f1cb6c25ca27a2609a85a9e2ff767e229221ebe2f0268ebf06bff045d8939b97e3ba29484bc5861b5dd95e6eab480236c1818e806d74ae6c37a23c78cf02c89061570a9dd731d8db0351ef6dce497de943da18216fdb0f3792120ac42e588058c68b5d163042a1d50a90017190dcdf183810efc8e7d2fac43dcd375c494e89d31e277776f3fa3f7edf7013be43417d3687c415c4b46c59c0bc853edfba16053cb2a45e0cc6cb2c95ab8db3e3fe8b9b76848ae5463011e36360a8815b146261ef04f0e03469e8ea707431ed30f8f43b2f39926449097a54e3ced0541769030850f6dffa5fa921d8872f7a5f85ad77961d6cd006515cae7fc1f53e0e42d469f2a8102ad936b9864f6501b172322e15c53ae82da790c174b1cc5674fc7f09c89ec47bacc7a23e81556bc3a3d092205722beddbed0470bbf73d35844a92a068f16a1c7acee4d811a5a806291b8cfc24d46d579d3de086119989c0f872025186ffea66b93afb3f603244b0973396d53bbb2a2ac6bd1dde2ba55369b0639b40914fe1a75bad04dfffcfae0cdd3b09862a6d450f3e2ff7375ba31c56e289392f3b9d034bf1bed4f09d5e4869248450347f117e488bb5df8e064393fdeb59cb1b2be16d07dbdf1f746a0a6f6c66d856850d832e2741d417f0101a5c9eda8d00165740927ad610bc416a08a7bccebf45d84b47feefed5a56961b4a12a244e9c8c5d9f86809a3c3cad14b8a3ed231aebcf4beadb5bc726ddaf4f2ad5d5ca2637df84658c4939fc2b703b38d949d8f7ae0e89bca9164a23dad342f69a93064771ae90a6a56bd5dce3944688a584dd04ca339c7b3368fe03c96d12d16a16c0fafabc1879d73890e609a830138a2321b97a1f9b968280d857769fda84b22b0af9c91200ff43966cd5b42d9378d5a30ff974e50c0b5bcf9bf44b4dc2ae593282fa4c8fab3b4745a80e80c6a54e8545175d9661ec71a3241ed73d5d1a190d86989d0c735bc849de6fd5d18e3b924943cfe0273d8e91d65ee15d86d9da4174d4c40db9dea6dabb5119fb9435693070753a01671342e2aa90ebb325b020706146f10bcbae7399f122934ce26c248e5a5ca7e8228b17e9060b0b7f727ccef82c0485a475f021bdd9e05ca76b3788399b4a17a76720d3cf84b5dbae3524fa901ca82a3d0f1711921d9fe6447384051b7dba0d65dd2f2626c4024bec2e3032b65a9ac2eb579e9d9f235383d74a72e352466bd8433d28c1dda4cf563876cb1ce1dfd0a81e2873e83a5b0e2d9009b5113fe075ceeb9bf96933be21554d1ccfdd174c2df7b9237b7422bd136c7a41cc582d2ecbc44bca1ecce200b1198616f1e04dea94dc3772bec1db181eb7ce8b33503e6406f9d20a502f1e7af64a41b3c43890d8e45a09a420427cac4c19c1ab76d6c52232a874a62c858b3baf44096f19ffaaf5eeaddd945add131769acd8f23f860507038f360f13af8b7e79ede145d2d06dce29023499e5492eb983c90d76c92d65eef2721b1cd6d864904e0d9e166c493e0388f2e7a8cca4ecf73216d7625bd5750be9941e9a93db81710c758bade548a63591f8a9f22aceaca75e4e888932f8d6937db5aeaa938978faea7a5176999dc92800920022b18e4e16debb81b8b203f63bb8d8462cb2208150a52208734cabbbd2f6cd409a2c900eaf83fe38d15348829c1932b1eccff6b78bab2725e754adb233efc6cef7e288a42a9197232e47057a711c4e46571e45545be0662e5e65c812696f00b2e41b4f72b4d7cbfe6f473d1e33e8dddefea03bae4c3840550f6e153007b53cf4f44157ccc0d3bdc4d0146884e01d4c443f70dc70373630ea361c48939bafa09bb96adbf969ee5fbf6f817519b18e19296228772f7daad14fe7410a924aa2f03be9c3b183c5ba39a1c38facb9b34d8a59faebaf5f8de2e54c9792dc46bbfce55fcd0e2dccb4144957f7d26392f2ed8a2b350a13d4b7b2cdc0f5482b14eb29223baedc4153694791e5990ec339033fb7f930f68112f3f28cf0b6a342209e55e5e76d3e444e2136e9a59c78682965e05caa7fb0535410eb601c690419932d6ef48a408a6f1a0b0f7261a8daa6f42e1c32f3e7b9c03d6380da1dee4b28d55b192a76ca4f58a06289806fe37f95b898285a9cbc4d4efd940a24e8be4c6e893c3b92014a62c2e8b1a8b28221579b43fbdbf10713c123588dea59c4c6b0525319bc54bef2f14be48efef4cc2d965aacaa8571aaebd87956efa4300373a8124e0e1b87bd59b4a5137b876c8cb6be163cd4f327a6586f4eed3309b3a8cbc32aa2a8611b2eb4d80ec6c93abbe77c1da7d34a4b32e4636c99ac4691f58f2ad84021cbf51214107e28dd5870b0448a12be1a176d343f027730e1a176d5a841e24cc6b2062760c5e5e378551ad9ff5c9c184e0a2274807b38cfc54a96c2978ad52eadcb6e8a4ed53e6cfaa25f73e95f51eabd10e30daf1dc9f35a047560f8fb4693df04b01c55b575f7e71c2f0282cff231648e236f4728fad0a9558491f3bc8f2b68af6578e4c94c5bee818232f64bf6cf0a926eed7ec1411a4e83e8dea9d6cf19cf33b29ae8e99c654dfa250d881bcc3ad36f67f2abdd4855a7d4f52d5321e5a8b41bab4855b63b4b2e3ebba29f5ab0b65626ebea765d8552e15bbbec7bfadbee1de211f82be7b03c0fb0f0de83bd24480abfe4a54a9f8158460d0a14f203b4b13372ead6ec5f4f56038aa65165009fe1f1bfd52e844c97ada68839b0978584b4f8cd17992e02b40af69bdb18a937feabf0143c50224c7535615b3a57618238d2d43aef82319ea8f573d983feca69fe68218b4599bf48e90314ad701069318a76d5d6331eac7b6f2d6ca1965af9f7ce7fa71ebcb95d5c3698fbd9992fc9260212dfca741acc856d38f1e04f3a2e7c24b89148fc0fe8951ca06cd9e1aeabfa5599ec6996e92df9305b155df65a87748dc337db66a682a2a9c9c8ced432fbc344a185ec89deccfb25e8b831656500c2c7ae30ec6647f4a30538ef38539450ebc939f281b8ed24e9206e149a1e4e0dc3861fd9f9d3190bed1b18b9fa1ab595441f8761b704a3984beb75e73501c632885e615bc8e495b2c4c8a645b7caa9d51d22ddf00d47827838e1bb193de4b677459bb189fbe4bdf19d41913e004f73e46c529144512f5b14fa5b4bfe9c1721d38f3a0c1d1f7dd3f5ae28454c05cf131992ba202426ad69ba3d71c66b956db49a8bef948e331a721123bc50ced3874eacec349521ad361d8f333fbeee06b3888c554e401d023ef4860545227398b2d6b503aad2740fc33ad517021742cc4ddb0dfde512aadf774606f7fc8a6f9abeef45ce086cc7f7f7bc6bf89a80e5f7d156f2ee04a92fb95bd0f7b7cbdf4e3cc359219ffe304d96654b11410ef3ba616b49e057aac3dc516f37be65f37ef1fd68b824dced55439c94cc02a8426912df07a2d1617ee2e6c9b9b070d091935adc5254e82821127d07014a5bfe0ff6d4f15a5a0485d37904dbf7cde00d8bc306c51a60b14333b9a39be400a5b1c951522eded33118b45d41290679faa6429148f8b1092598306d8f07e65a2344f43bdfe2573423b984abd0095521a641db284e9545f53a2f30e851a5cc4874c52ea2eca9fc20869b8834a96e0d586a0478a10a185e251ab528228b0c9470832f0ab8fc07878d40a36bcc5db9a98283ce2a16c4c2ecb70c8874bae8edee23b17615593c05e5b8e7043daf7b74b155189281866a7f27aa8d0500e46393c4285654e0bdcf8d76f1d556489f7949a64de03de17bddac10074435f1972d734a9d30eec108ccf847e02cb2902520ba43176eac721b37e711f366160304df709876aba6c949c4b0415327bfc6620ee34f05fd5126ef2f3885bb45cdcfc5fabdb92ca7107ba05d2513283437631db376b4fffdc0ca834b7ce474174090161455dcaeb5e61c29d65acef38183f99c36739da91efbeb39e39a9c2c41469774b9279bcd5a87fce456335bcd4ad5e0bae44663cdd5c6666cb33c2dd09cd92ccc95c8c91252c540774d114a31b444c1453208d08a1ebb7446becb2a912ffac39ff30b1353b0059485ac22778732fc1d02ee03500f477dc6d43cb35492952b996f5cb192309848416f9d2e07a3ffdb551de6a2985a2d9b87544682642bf57028bcaf4c847b64f24534381b871e0529589c66a4b951852d6930937be79dbe351f581d2876af10093d5813193e04e17abf32be2b41802e67760786981972e325e01408643e6046fc54e1509a826612e0819c2769e56792aa8f6dadc5dd37f5118cb6aa4842b7983039dd52531fb5e5862386dfde064d7f5789770628afb72bb2a6669337bde9a72ee2c02b4df490b214bf9c50a0e58bdae65b03b970940d107e9f8456c857197faf17b88b920f5ee951367df59c42c3b8a56699700e2a7fc9f4b2405d285303df12e7442915ff4e5aa4a6a3a9482cc9958b2de31af227b1b663e47ea8ba4bd4c47610b38e28e3db3e1d6042dd5a1a0c3500f95b87fb43125927fde02a7b131b892844735bde0fb4d", 0x1000}, {&(0x7f0000004840)="67648cf08499f0919f724c283a679d4317a54c87ad7aa8695468924cea1fbe49adcce7d8f41918fa7c73ab3cb19e26f22d68243a7e51f254594fd99fec93bc5595daeb21e9e2868229d70a1c6ac0487bf0f71f7164663a34c55e5b609ea8536bd60fd5fa1640a5b61c4644685dbf89b02f77854a1e448914e37578bd766e214a549e24dab4ade1e0208b1093a6e71daba5a09cd9c9c4696b828cc98d844839c430b0bc844da3a2263357006169f89775ac3c23af8a9d4df3ce43ef1bbf3b380e8b3fad171ffca5", 0xc7}], 0x4, 0x0, 0x0, 0x81}, {&(0x7f0000004980)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000005a40)=[{&(0x7f0000004a00)="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", 0x1000}, {&(0x7f0000005a00)="b3318abf6eb58d2f801c424305bdbbad6c153fb51aae76b4", 0x18}], 0x2, &(0x7f0000005bc0)=[@cred={0x20, 0x1, 0x2, r23, r24, r25}, @cred={0x20, 0x1, 0x2, r26, r27, r28}], 0x40, 0x4}], 0x6, 0x20000000) r29 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') unlinkat(r29, &(0x7f0000000180)='./file1\x00', 0x1fd) 03:10:12 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) getresuid(&(0x7f0000000200), &(0x7f0000000340)=0x0, &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000001500)=0x0, &(0x7f0000001540), &(0x7f0000001580)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000015c0)={{{@in=@initdev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000016c0)=0xe8) lchown(&(0x7f0000001c00)='./file0\x00', r2, r3) getresuid(&(0x7f0000001700)=0x0, &(0x7f0000001740)=0x0, &(0x7f0000001780)) r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000001b40)='/selinux/avc/cache_stats\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001b80)={0x0, 0x0}) write$input_event(r8, &(0x7f0000001bc0)={{r9, r10/1000+10000}, 0x0, 0x69, 0x100000000}, 0x18) setreuid(r7, r6) syz_open_dev$loop(&(0x7f0000001980)='/dev/loop#\x00', 0x9, 0x32100) stat(&(0x7f00000017c0)='./file0\x00', &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}) clock_nanosleep(0x7, 0x1, &(0x7f0000001d00)={0x77359400}, &(0x7f0000001cc0)) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x20041, &(0x7f0000001880)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000010000,user_id=', @ANYRESDEC=r1, @ANYBLOB="2d67726f75705f6942df", @ANYRESDEC=r3, @ANYBLOB=',max_read=0x0000000000000001,uid>', @ANYRESDEC=r4, @ANYBLOB=',uid=', @ANYRESDEC=r5, @ANYBLOB=',euid=', @ANYRESDEC=r7, @ANYBLOB=',fowner<', @ANYRESDEC=r11, @ANYBLOB=',\x00']) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r8, &(0x7f0000000480), 0x100000262) r12 = dup(r0) ioctl$GIO_FONT(r8, 0x4b60, &(0x7f0000001d40)=""/223) r13 = syz_genetlink_get_family_id$tipc(&(0x7f0000001a00)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_WINDOW(r12, &(0x7f0000001b00)={&(0x7f00000019c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001a40)={0x68, r13, 0x102, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0x4109, 0x0, {0x4c, 0x18, {0xa4, @link='syz1\x00'}}}, ["", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x40080}, 0x880) pipe2(&(0x7f00000000c0), 0x800) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:12 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000001480)={{{@in6=@empty, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000180)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@euid_gt={'euid>', r1}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x4) faccessat(r1, &(0x7f00000001c0)='./file0\x00', 0x4, 0xe00) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0x100000001}, 0x4) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_NOTIFY_DELETE(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="310000000600000003000000000000ba7325d27ff420a60043a24100030000000000000000000000000000000800000000"], 0x31) setsockopt$inet6_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000340)={0x84}, 0x4) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:13 executing program 3: r0 = socket$inet(0x2, 0x803, 0x7) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x4400, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @remote}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000001c0)={@multicast1, @local}, 0xc) 03:10:13 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = accept$unix(0xffffffffffffffff, &(0x7f00000001c0), &(0x7f0000000100)=0x6e) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0, 0x0}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f00000002c0)=r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) lsetxattr$security_selinux(&(0x7f0000000240)='./file0\x00', &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:logrotate_exec_t:s0\x00', 0x22, 0x0) timer_create(0x7, &(0x7f0000000000)={0x0, 0x30, 0x5, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_gettime(r3, &(0x7f00000000c0)) 03:10:13 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB]) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = getgid() getresgid(&(0x7f0000000340)=0x0, &(0x7f0000002940), &(0x7f0000002980)) r3 = getgid() setresgid(r1, r2, r3) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001480)={{{@in6=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000080)=0xe8) getresgid(&(0x7f0000000100), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) write$FUSE_ATTR(r0, &(0x7f0000000380)={0x78, 0x0, 0x1, {0x2, 0x401, 0x0, {0x1, 0xe5, 0x401, 0x549b, 0x800, 0x3, 0x1, 0x9, 0x7fff, 0x81, 0x8, r4, r5, 0x2, 0x2}}}, 0x78) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000001580)='./file0\x00', 0x1, 0x6, &(0x7f0000002800)=[{&(0x7f00000015c0)="597eef45946d872c654df99ab0d93ac82b910a1c122097f1f3df", 0x1a, 0xa1}, {&(0x7f0000001600)="da0ddb3476d45078", 0x8, 0x1f}, {&(0x7f0000001640)="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", 0x1000, 0xfad}, {&(0x7f0000002640)="64aaa60af69251e86c3268b9ea8a3d65f01341434d6ef9eaaeac710e0190db2f94e3f3b1740e9fd9ac65b02268bb8921d9aed5ae46ccdd05cdeb617b561ae414ff5b15c978a5b6338630e58449cd4bf60bcc893664763dbff187c63d3ec36744cc38df5641c8a2f7a345418ffdce3a6fb76435b48b80c22a514ac5468e462778774d0857551f3800e1c0b654f8fc7ee547d60d6209eaa61f56e658e3d1d24ddd50a0", 0xa2}, {&(0x7f0000002700)="a9e28c68d83c78631efb4d9d6559f1aa8e2e0ee8332503f7cf0d0d9bb1a74cfd452898e84d326a536d502145ca15af8ea16fb5d9234eba94d2452949150a0928dc663eac068cef12cd334d644c626ba6863931dc9d1cf785e64374b24e1cc259e2a747bdb98e526956f85b3958984d38f4d2139f41a8", 0x76, 0x4}, {&(0x7f0000002780)="59819a4f3a9f29000cd3cd0b1c24e9f9a4dba47548e167c3ce745d77628f710d8809960f93a1571881fc2128882014aae5cf53bef61f164b43b68fe63fe8c6450267679cf4f3ecc6a15de358f79df7d8ff07834f772d00403e77386b61b4701b36d95f6f1f856b6bdc2e06a018aa9e6b10a5a9d15f449c9f4b", 0x79, 0x6}], 0x20000, &(0x7f00000028c0)={[{@nojournal_checksum='nojournal_checksum'}, {@delalloc='delalloc'}, {@sysvgroups='sysvgroups'}], [{@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@fsname={'fsname', 0x3d, 'wlan1}-vboxnet0'}}, {@uid_eq={'uid', 0x3d, r4}}, {@smackfshat={'smackfshat', 0x3d, '/dev/fuse\x00'}}]}) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:13 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x40000000003b) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="390069147500bc1d002e000000467daaeea9816746c7a932b3f41b11935d65991f6fe97b4f86a90fd0c3559531409e57875f58e46d15160156"], 0x39) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setopts(0x4200, r0, 0x5788000000000, 0x20) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000000c0)) ptrace$cont(0x1f, r0, 0x0, 0x0) 03:10:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',gNnup_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:14 executing program 4: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20001, 0x80, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x4000, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c000000000000200000000002000900400000000000bc000000000003000600000000000200ee00e0000054d81458186fe8b90002000100000000000000020200044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) flistxattr(r0, &(0x7f0000000380)=""/1, 0x1) socketpair$nbd(0x2, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) memfd_create(0x0, 0x0) faccessat(r1, &(0x7f00000001c0)='./file1\x00', 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f00000003c0)=""/209) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(0xffffffffffffffff, 0x40485404, 0x0) exit(0x0) timer_create(0x9, 0x0, &(0x7f0000000300)=0x0) timer_gettime(r4, &(0x7f0000000880)) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000840)={0x0, 0x7fff, 0x0, 0x0, 0x0, 0x1}) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f00000004c0)=ANY=[@ANYPTR]) fsetxattr$trusted_overlay_upper(r3, 0x0, 0x0, 0x0, 0x1) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x8, 0x2, 0x0, 0x7fff}) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) connect$netlink(0xffffffffffffffff, &(0x7f0000000700)=@kern={0x10, 0x0, 0x0, 0x2000000}, 0xc) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r1, &(0x7f0000000500)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x1c, r5, 0x300, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) setxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000800)={'L+', 0x9}, 0x28, 0x1) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000940), 0x1, 0x0) delete_module(&(0x7f0000000140)='L+', 0x806) 03:10:14 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000440), &(0x7f0000000280)) write$binfmt_misc(r0, &(0x7f0000000000)=ANY=[], 0x323) getpid() sched_setscheduler(0x0, 0x0, 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), 0x4) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="ef"], 0x1) sendfile(r1, r1, &(0x7f00000000c0), 0xfff) sendfile(r0, r1, 0x0, 0x8fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000340)={{0x2b, @loopback, 0x4e24, 0x0, 'fo\x00', 0x24, 0x1, 0x33}, {@rand_addr=0xdc3, 0x4e22, 0x3, 0x1, 0x38000, 0xffffffffffff6485}}, 0x44) fgetxattr(r0, &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f0000000100)=""/215, 0xd7) [ 984.603848] SELinux: Context system_u:object_r:logrotate_exec_t is not valid (left unmapped). 03:10:14 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000001740)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000100), &(0x7f0000000200)=0x0, &(0x7f0000000380)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001480)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast2}}, &(0x7f00000003c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast1, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@loopback}}, &(0x7f0000001680)=0xe8) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000001780)={0x0, 0x0, 0x0}, &(0x7f00000017c0)=0xc) fsetxattr$system_posix_acl(r0, &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000001800)={{}, {0x1, 0x1}, [{0x2, 0x2, r1}, {0x2, 0x4, r2}, {0x2, 0x2, r3}, {0x2, 0x6, r4}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x4, r5}], {0x10, 0x4}, {0x20, 0x5}}, 0x54, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="7a35b6eae0a4"]) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000016c0)='/selinux/status\x00', 0x0, 0x0) recvfrom$inet6(r6, &(0x7f0000001700)=""/15, 0xf, 0x20, 0x0, 0x0) setsockopt$IP_VS_SO_SET_FLUSH(r6, 0x0, 0x485, 0x0, 0x0) r7 = socket$inet6(0xa, 0x800, 0xfffffffffffffffc) listen(r7, 0x2) read$FUSE(r0, &(0x7f0000000480), 0x1000) r8 = syz_open_dev$mice(&(0x7f0000001880)='/dev/input/mice\x00', 0x0, 0x2000) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000001a80)={r8, &(0x7f00000018c0)="312e9f6b765d2aaa6f8749f04883c0b7407dcdf682d29b2018b7c7ccaf3df6a9be51d4046652bf04898ea85d5ebe5ef9b7172fde4e2dd69bd8d39257952e24a61f28de400c7a54d1274665bd61744c98a1f604584abfbb3ef2868c4d3911aae5d1b68cbf756a7da19bf33b2e4cc8123a23665d07c3090a4b7a380a956010d8e82f27f41f981405bf48e89ca263fd417d0d43835ef3d7376ee96b30e93326f02baebf596819dd0f35de582c3671b55f8a60908c1d8ab9e14cfa86e55231d20d2d7d0073f333a1cd15425b51e8742deaef471a7978b2", &(0x7f00000019c0)=""/141}, 0x18) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:14 executing program 0: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f00000000c0)={0x28, 0x2, 0x0, {0x1, 0x7f, 0x100}}, 0x28) getsockname$inet6(r0, &(0x7f0000000380)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000003c0)=0x1c) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="000000f600009e2686e578c03d4954b325a9", @ANYRESDEC=0x0, @ANYBLOB="2c002e5c5bcb03e210adb87de5fd09011742b9a2f60768915ac40cc580c1920cc427371ee1b78d2021e6e9d225ebc1f25bbbb6cbaf0c56e088e1fc"]) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r1, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r1, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r1, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) setsockopt$inet6_tcp_int(r0, 0x6, 0x36, &(0x7f0000000340), 0x4) 03:10:14 executing program 2: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000200)={0x10, 0x0, 0x0, 0x995ba2d8201dca0b}, 0xc) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="541cc5ed5e50467fce797ad7b20a1b0168c75ae466c245a9cda2190716897c3e546379d171eeacd9b4e40dd2f9f110c3e9621b14330b4bd20000000000000000c4dec524b9c3facc326c3c8873037aa57b93e893642e7ed9922d2efc8e417c5e90fb0e2ddd72ef121d29ce615ef0db00dba527dc1619a9d509a643e4acd8fbd9044c8c99e9fa7ee270e4677c49b1234d96daa02cbe5233e222ac3720022999cfb5581e75b5377bc5555eedb44ef10ed15be618c2f012918b4489bc1c8665072003b676b9719eabf1e78ee01028949100537ff15c2510087878fce3602e96f4499a9d6ec27e93aadade331e680712c4c100") r2 = dup(r0) ioctl$KDSIGACCEPT(r2, 0x4b4e, 0x6) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4}, 0x1c) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, &(0x7f0000000000)={'ip6tnl0\x00', {0x2, 0x4e24, @rand_addr=0x1}}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000680)={0x100, {{0xa, 0x4e23, 0xfffffffffffffff9, @mcast1, 0x10000}}}, 0x88) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000640)) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f00000001c0), 0xffffffffffffffff) getsockopt$inet_buf(r3, 0x0, 0x0, &(0x7f0000000580)=""/18, &(0x7f00000005c0)=0x12) getsockopt$inet_mreqn(r2, 0x0, 0x0, &(0x7f00000008c0)={@loopback, @multicast1, 0x0}, &(0x7f0000000900)=0xc) connect$packet(r3, &(0x7f0000000940)={0x11, 0x1, r4, 0x1, 0xd1, 0x6, @broadcast}, 0x14) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f00000000c0)={0x29, 0x2d, 0x17, 0x1d, 0x9, 0x1, 0x2, 0x11c, 0xffffffffffffffff}) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet6_mreq(r3, 0x29, 0x1c, &(0x7f0000000600)={@loopback, 0x0}, &(0x7f0000000500)=0x14) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000540)={r5, 0x1, 0x6, @remote}, 0x10) lseek(r3, 0x34, 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000080)=0x44) accept$inet(r3, &(0x7f0000000180)={0x2, 0x0, @local}, &(0x7f0000000240)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x10000, 0x2}, {}, {}, 0x80000, 0x0, 0x8000000000000001}, {{@in=@multicast2, 0x0, 0x32}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x90, 0x4, 0x373752d6}}, 0xe8) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000780)) sendmsg(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000001680)}, 0x0) 03:10:14 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001480)=ANY=[@ANYBLOB="667457c6add2ce22751a3602d7e81fcdc2783dee3e828f45413c2d0b0f3cd0c893835e5d5ca00ce9d1e0996d4df3ad9be7a8e68918c9f97410b322df822c9fea73e1e9733a37c4b5d4e8b21fa6a2ee782b1938a40cbfca5120e8c0981c3113f3deb25c1a0d8b4ccb88028c870f000000000000092e7f8b28fb0002ba7663e4202c12696d34db5aee33a16eb5bd2b9c4c76df6f97e85d374d028850b96d1ee37531e4b112886e78e2e34ac01585391bc9672b659a1af8c512e5c34bf29bbdae20a3fdc24d32cbbb9c2c7b723c923f9e0c4a43f8ac1c98dead14a2dfaf", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x0, 0x0) sendto$inet6(r1, &(0x7f0000000180)="73e1b431ba183ed45a98df512c90c8cf253880fa7f32b79272ac85d223933115ba364c8014768e720aaa7367e0dfbe8a645c64b3eeb581b219b00017034dc16bf581e5cea34f573653861860b0b49aa7972d6a29056f7a59f8cb4bc9b6e91ac97d50fb4c9085e5f0b507594f8642f68d72317880713dd53bc6eebdfbbd54574dbe60ffff8b06dfc3937f428dc353ce62975c85937b57f4e8b9b8b88e802682f69f985493b3bc55fa14cc58e33b6939393348dd4e3db05c25", 0xb8, 0x4, &(0x7f0000000240)={0xa, 0x4e24, 0x8, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x7}}, 0xff}, 0x1c) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000440)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000016c0)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x10400000}, 0xc, &(0x7f0000001680)={&(0x7f0000001600)={0x4c, r3, 0x100, 0x70bd25, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x62}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4814}, 0x8000) ptrace$getregset(0x4204, r2, 0x203, &(0x7f00000003c0)={&(0x7f0000000340)=""/89, 0x59}) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) 03:10:15 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x3, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fc, &(0x7f0000deaff0)={0x2, 0x3, @loopback}, 0x10) sendto$inet(r0, &(0x7f0000000140)="e1ec84b956e39237d140b91a5e6cb614e850381aaef47b0ce3ad4cdbe5f5cdd6ccd454bfff8733322cef3fa98fecf8ecea4a204750e9445f7a7aff4d9111d7c8d11153ac0c2d39537685846c17cfd7641e005b59a968201d8b9f5f806619ed51ce7b55ad7eb019ed9139f05d8c8f9bc21f4d522f8e0e43dcdd5c88b472e5d47ccb94f23214478d1be2cbc6d4cd0ea61f3d450357c59f385a04713728d3f898f4c0d1ca37685d747efeb1836bc1367d7198ec81399d9e914c8b83830792ad03e2426c8d8b883a30ac0eb7022fde425a006b826637d4181a8e1fe63ea2ed6caa4c6d4611e8072c3fb2da548e861dc6b9647121d07e7f8fc37dda85601fd1761f", 0xff, 0x20000004, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioprio_get$uid(0x3, 0x0) setresuid(0x0, 0xee01, 0x0) add_key(&(0x7f0000000080)='cifs.idmap\x00', &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key(&(0x7f00000002c0)='pkcs7_test\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000540)="82a6aa05b8ab68bc43b74e76736a76c665db6a029d644ad896520814352757c1644b0d80815cca33badee7752e0b894fe34ed3c4c69af8dfca40b7303344b5b38e551ebc75abac072ea173796a35a61bb59ca5f0543b95dd66efe565505c90f56806188a9dba178ec86679652e35ea01906fad91728e63192bd9737361513b50ffe1e33d9eeaca60fbf3d994002975d7348d58c253e60214f88da5ac89362284c33ef7c3835b98d1a62653a5e3b72a8e94546448ffc9c4fae14252ff", 0xbc, 0xffffffffffffffff) setsockopt(r0, 0x6, 0x2, &(0x7f0000000640)="0d6877e16db2c975cd60a30f7269d0739488836d692825acd3904d64bc24a4d32fca4e09fe361b241dfcd101ed7fa3412fe41cd2cd47f95a5b6652970a86b23c342e92bd810f3e126d5686f0cbb48bd778832df91308d01e0906bd83d0ffb2c7267762e06e2b22295d6b0b6c4185f040befac4b113f3a6780a04d405e096e2cf12ade504ef22a99eeffe1dffdb4b27c5a2ef5f7f2cdd3d6cf110d09eddc788cbc6147102f217591e9621f5a93436d2a9034ed55bdfc8af2fec575430c666f71edc4c149f0c9305e7b4c0ff426b7a2ed4393cdf22c1d03450f056b3", 0xdb) r1 = request_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x2}, &(0x7f0000000600)='wlan0\x00', 0x0) add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000003c0)={'syz', 0x0}, 0x0, 0x0, r1) geteuid() ptrace$setsig(0x4203, 0x0, 0x9, &(0x7f0000000340)={0x2f, 0x14, 0x4}) sendto$inet(r0, &(0x7f0000000100)="a2", 0x1, 0x4011, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000000)) 03:10:15 executing program 1: timerfd_create(0x0, 0x800) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@allow_other='allow_other'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@allow_other='allow_other'}, {@blksize={'blksize', 0x3d, 0x200}}, {@max_read={'max_read', 0x3d, 0x1}}, {@max_read={'max_read', 0x3d, 0x100000000}}]}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000002480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x17, 0x5, 0x1ff, 0x7, 0x4, r1, 0x81}, 0x2c) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x42000, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000140)=0x7, 0x4) 03:10:15 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR\x10\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f00000012c0)=ANY=[@ANYBLOB="424d5c45893a26a71dc03dbf60bc0ed6b40d04c6a86be85c527b1cf3056cf3a6e6174816e1f4cdf73471a359be62ac1b9dc1c7b9d9ac6156815daf987813a438f2236e6b1aaed5d4fffc23db373d1aa6d8175af88cb18cbb5b621263aa5888967b43450737c3552e86662e54ad72f6d444b75e890a8c810569b67dd27548f9b588b9a679f734f5900f213238fe5928d7ef4332501073cb384b8c976b69c1050000000000000027017e4158c9c4bdfc46e7448ba95d168599ff1d426d1b3501f4cf8278fa96705abe2beb61b8"], 0x1) fallocate(r1, 0x0, 0x0, 0x2000002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86c6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0x0, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) timer_create(0x7, &(0x7f0000000080)={0x0, 0x31, 0x4, @thr={&(0x7f00000002c0)="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", &(0x7f0000000000)="8bb1aab6ceff2216ecf5770b752f5067f2ea37602371746e612f4a7090afe869031cc9fd5e433784"}}, &(0x7f00000000c0)) 03:10:15 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKRRPART(r1, 0x125f, 0x0) setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='security.SMACK64\x00', 0x0, 0xc9, 0x0) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000140)={0x1, 0x88, "3a02433ab061e7b2294f55c5069bda04d2d12ce0f90af5d836790a6de5d7c3fa07ccb7dd303624f7c77acb71bf74915a1318d4c70de58e8f0755696e176a1a3a8039121e7a34a3ce6c952dadecb9e582f4e82e5dc8f2cc921083b3ea6c215c1e951398639342b47a7719c3a761ace18e227a2d27ee5b24c87c4ca87d6c992be9f7cf471f1e0b583b"}) 03:10:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x2b, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000a00000000000000ff0100000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000089068f17620000000000000000000000000000000000000000000000000000010000000a00000000000000fe8000000000000000000000000000aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x110) [ 985.684156] audit_printk_skb: 21 callbacks suppressed [ 985.684167] audit: type=1400 audit(1548645015.534:459): avc: denied { create } for pid=25879 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 985.838791] audit: type=1400 audit(1548645015.684:460): avc: denied { wake_alarm } for pid=25889 comm="syz-executor1" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 985.932558] audit: type=1400 audit(1548645015.774:461): avc: denied { map_create } for pid=25889 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:10:15 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000001480)=ANY=[@ANYBLOB="64f6c4adc8405a273b3c5f9b9cdf426e00d45aa8db57107d2cfe5396bd540359d811aaeadaa3ec3bf973349db66080effc76ce926a0d31030a7b9034a1fd02daae4c5fc084263480d4fdacae7e902ee3e4df9f9ff4e556fc730ce253d763b65a1d6fb956a80d9b1b24a0a1939f06f19e056bea0205494a612efd51754fd455d9c20e1758dff4b8370baa3038409e36e1ec7aa703d6f44465b873ab7e20089fed20bb0a2193e2e380bfb775cf369a1a5100833d243f7df91161fb1c0418c59baa61f68f45d571b085c89d52be9857ee2b1d38d466f7e4256929c93cf9d39aafc40cf47666874e2490309aaefffdb1db762bccbbeb1d"]) read$FUSE(r0, &(0x7f0000000480), 0x1000) r1 = accept4$unix(0xffffffffffffff9c, 0x0, &(0x7f0000000180), 0x3577c5dd6d6ccfd) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000100)=0x7f) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) [ 985.947296] audit: type=1400 audit(1548645015.794:462): avc: denied { wake_alarm } for pid=25889 comm="syz-executor1" capability=35 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=capability2 permissive=1 [ 986.049464] audit: type=1400 audit(1548645015.904:463): avc: denied { map_create } for pid=25889 comm="syz-executor1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 03:10:16 executing program 2: [ 986.364458] audit: type=1400 audit(1548645016.214:464): avc: denied { write } for pid=25879 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 986.426506] audit: type=1400 audit(1548645016.274:465): avc: denied { create } for pid=25879 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 986.436002] audit: type=1400 audit(1548645016.284:466): avc: denied { write } for pid=25879 comm="syz-executor5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 03:10:16 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) connect$netlink(r1, &(0x7f0000000340)=@kern={0x10, 0x0, 0x0, 0x800}, 0xc) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB="eb0beed56bce6d9fe17f9ad6587d7faa01d620"]) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000003500)={{0x81, 0x7f, 0xfffffffffffeffff, 0x10001}, 'syz1\x00', 0x30}) read$FUSE(r0, &(0x7f0000000480), 0x1000) read$FUSE(r0, &(0x7f0000001480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000002480), 0x1000) r2 = fcntl$dupfd(r0, 0x406, r0) accept(r2, &(0x7f0000000380)=@generic, &(0x7f0000000100)=0x80) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000180)={0x5, 0x80000001, 0xfffffffffffffffd, 0x5, 0x4, 0x9, 0x5b5}) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000003480)) 03:10:16 executing program 4: 03:10:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@random={'trusted.', '+\x00'}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x2b0400, 0x88) ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f0000001480)=""/4096) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:16 executing program 2: 03:10:16 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x6) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) read$FUSE(r0, &(0x7f0000000480), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0x0, 0x2}, 0x10) 03:10:17 executing program 4: 03:10:17 executing program 3: r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) r2 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f00000002c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x54, 0x6c, 0x4, {"681fa97debdafcef23af40b38dc0515dd08da59d19ca088f411c32c3a85a18b9c1b991518db6e9045bf4aa46cdc8608cb1aec90799b9daa40e1a7192a8c330e95f3c44583297139d0f085115cd16a4d22c"}}, {0x0, "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"}}, 0x0, 0x16a}, 0x20) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000440)={{{@in6, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f00000000c0)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000540)={{{@in=@multicast1, @in=@loopback, 0x4e22, 0x0, 0x4e21, 0xfc2, 0xa, 0xa0, 0x20, 0x3a, 0x0, r3}, {0x8, 0x1, 0x6, 0x36, 0x7, 0x0, 0x800, 0x41c35bde}, {0x0, 0x2, 0x276, 0x8}, 0x3, 0x6e6bb0, 0x3b26193e7e703546, 0x0, 0x2}, {{@in6=@remote, 0x4d2, 0xff}, 0x2, @in6=@dev={0xfe, 0x80, [], 0x1e}, 0x3502, 0x3, 0x3, 0x3, 0x7, 0x3f, 0xffffffffffffffff}}, 0xe8) r4 = dup2(r0, r2) ioctl$TCXONC(0xffffffffffffffff, 0x40087101, 0x0) r5 = open(&(0x7f0000000280)='./file0\x00', 0x20000000141042, 0xfffffffffffffffe) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$binfmt_elf64(r5, &(0x7f0000000480)=ANY=[], 0x2e7) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r5, r5, &(0x7f00000001c0), 0xa198) ioctl$FICLONE(r6, 0x40049409, r4) 03:10:17 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000140)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1148) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, 0x1, {0x7, 0x1b}}, 0x50) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB='s']) read$FUSE(r0, &(0x7f0000000480), 0xfffffffffffffea5) write$FUSE_INTERRUPT(r0, &(0x7f0000000240)={0x10, 0xffffffffffffffff, 0x2}, 0x10) 03:10:17 executing program 2: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f00000001c0)='./file0/bus\x00', 0x6857b21ff1155d90) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) delete_module(&(0x7f0000000000)='ramfs\x00', 0x0) ftruncate(r3, 0x0) [ 987.609821] BUG: unable to handle kernel paging request at ffffed0051f46bff [ 987.617330] IP: [] fuse_dev_do_write+0x183b/0x22f0 [ 987.623981] PGD 21fffb067 [ 987.626638] PUD 21fff9067 PMD 0 [ 987.630158] [ 987.631804] Oops: 0000 [#1] PREEMPT SMP KASAN [ 987.636284] Modules linked in: [ 987.639603] CPU: 1 PID: 25935 Comm: syz-executor5 Not tainted 4.9.153+ #18 [ 987.646611] task: ffff8801a67b5f00 task.stack: ffff8801a2fb0000 [ 987.652654] RIP: 0010:[] [] fuse_dev_do_write+0x183b/0x22f0 [ 987.661740] RSP: 0018:ffff8801a2fb79a8 EFLAGS: 00010a07 [ 987.667183] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc90000b18000 [ 987.674439] RDX: 1ffff10051f46bff RSI: ffffffff818667c7 RDI: ffff8801afc99c10 [ 987.681715] RBP: ffff8801a2fb7ba0 R08: ffff88018fa36000 R09: 0000000000000001 [ 987.688977] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8801afc99b60 [ 987.696236] R13: ffff88028fa35fff R14: ffff8801a0a8b780 R15: ffff8801a2fb7be0 [ 987.703503] FS: 00007fb265613700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 987.711713] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 987.717595] CR2: ffffed0051f46bff CR3: 00000001d52d8000 CR4: 00000000001606b0 [ 987.724859] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 987.732151] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 987.739404] Stack: [ 987.741544] 0000000000007813 ffff880100000000 ffff8801afc99b60 ffff8801afc99c10 [ 987.749640] 262d070d00000001 ffff880100001000 ffff8801afc99bfc ffff8801afc99c08 03:10:17 executing program 4: r0 = socket(0xa, 0x100000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000040)=@ethtool_rxfh={0x46, 0x0, 0x0, 0x0, 0x0, "1bea8d"}}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip_mr_cache\x00') ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) fallocate(r1, 0x20, 0x5, 0x7) [ 987.757690] ffff8801a0a8b788 ffff8801afc99b90 ffff8801a0a8b790 ffff8801bedfe600 [ 987.765720] Call Trace: [ 987.768330] [] ? fuse_dev_release+0x490/0x490 [ 987.774469] [] ? plist_del+0x27e/0x4e0 [ 987.780001] [] ? futex_wake+0x1b3/0x460 [ 987.785620] [] ? wake_up_q+0x95/0xf0 [ 987.790976] [] ? drop_futex_key_refs.isra.0+0x56/0xd0 [ 987.797804] [] ? futex_wake+0x14f/0x460 [ 987.803423] [] ? futex_wait_restart+0x230/0x230 [ 987.809740] [] ? perf_trace_lock+0x11e/0x540 [ 987.815807] [] fuse_dev_write+0x144/0x1d0 [ 987.821599] [] ? fuse_dev_splice_write+0xbb0/0xbb0 [ 987.828218] [] ? debug_smp_processor_id+0x1c/0x20 [ 987.834703] [] ? perf_trace_lock_acquire+0x530/0x530 [ 987.841449] [] ? iov_iter_init+0xaf/0x1d0 [ 987.847236] [] __vfs_write+0x3c1/0x560 [ 987.852789] [] ? __vfs_read+0x550/0x550 [ 987.858405] [] ? avc_policy_seqno+0x9/0x20 [ 987.864301] [] ? selinux_file_permission+0x85/0x470 [ 987.870988] [] ? security_file_permission+0x8f/0x1f0 [ 987.877732] [] ? rw_verify_area+0xea/0x2b0 [ 987.883637] [] vfs_write+0x185/0x520 [ 987.889019] [] SyS_write+0xdc/0x1c0 [ 987.894289] [] ? SyS_read+0x1c0/0x1c0 [ 987.899731] [] ? do_syscall_64+0x4a/0x570 [ 987.905518] [] ? SyS_read+0x1c0/0x1c0 [ 987.910959] [] do_syscall_64+0x1ad/0x570 [ 987.916666] [] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 987.923589] Code: c0 74 08 3c 03 0f 8e 2f 06 00 00 41 8b 84 24 b0 00 00 00 44 8d 68 ff 48 b8 00 00 00 00 00 fc ff df 4d 01 c5 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 4c 89 ea 83 e2 07 38 d0 7f 08 84 c0 0f 85 0d 06 00 [ 987.951496] RIP [] fuse_dev_do_write+0x183b/0x22f0 [ 987.958207] RSP [ 987.961816] CR2: ffffed0051f46bff [ 987.965272] ---[ end trace 0549bdf035f38a27 ]--- [ 987.970015] Kernel panic - not syncing: Fatal exception [ 987.975691] Kernel Offset: disabled [ 987.979303] Rebooting in 86400 seconds..