[ 32.632550] kauditd_printk_skb: 9 callbacks suppressed [ 32.632557] audit: type=1800 audit(1554982607.762:33): pid=6875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rc.local" dev="sda1" ino=2465 res=0 [ 32.659642] audit: type=1800 audit(1554982607.762:34): pid=6875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="rmnologin" dev="sda1" ino=2456 res=0 Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 41.473033] random: sshd: uninitialized urandom read (32 bytes read) [ 41.987969] audit: type=1400 audit(1554982617.112:35): avc: denied { map } for pid=7048 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 42.033406] random: sshd: uninitialized urandom read (32 bytes read) [ 42.716853] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.194' (ECDSA) to the list of known hosts. [ 48.321523] random: sshd: uninitialized urandom read (32 bytes read) 2019/04/11 11:37:03 fuzzer started [ 48.517470] audit: type=1400 audit(1554982623.642:36): avc: denied { map } for pid=7057 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 50.132929] random: cc1: uninitialized urandom read (8 bytes read) 2019/04/11 11:37:06 dialing manager at 10.128.0.105:42371 2019/04/11 11:37:07 syscalls: 2412 2019/04/11 11:37:07 code coverage: enabled 2019/04/11 11:37:07 comparison tracing: ioctl(KCOV_TRACE_CMP) failed: invalid argument 2019/04/11 11:37:07 extra coverage: extra coverage is not supported by the kernel 2019/04/11 11:37:07 setuid sandbox: enabled 2019/04/11 11:37:07 namespace sandbox: enabled 2019/04/11 11:37:07 Android sandbox: /sys/fs/selinux/policy does not exist 2019/04/11 11:37:07 fault injection: enabled 2019/04/11 11:37:07 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/04/11 11:37:07 net packet injection: enabled 2019/04/11 11:37:07 net device setup: enabled [ 53.521781] random: crng init done 11:37:33 executing program 5: mkdir(&(0x7f0000014000)='./file0\x00', 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0/\x00', r0, &(0x7f0000000080)='./file0\x00') symlinkat(&(0x7f0000000040)='./file0/', r0, &(0x7f0000d06ff8)='./file0/') 11:37:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:37:33 executing program 0: r0 = socket(0x400000000002, 0x1002, 0x0) connect$unix(r0, &(0x7f0000000100)=@abs, 0x8) 11:37:33 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) getsockopt(r0, 0x29, 0x36, 0x0, 0x0) 11:37:33 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:33 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setreuid(0x0, 0xee01) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) [ 78.142590] audit: type=1400 audit(1554982653.272:37): avc: denied { map } for pid=7074 comm="syz-executor.1" path="/sys/kernel/debug/kcov" dev="debugfs" ino=29 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 78.830319] IPVS: ftp: loaded support on port[0] = 21 [ 79.178571] chnl_net:caif_netlink_parms(): no params data found [ 79.188530] IPVS: ftp: loaded support on port[0] = 21 [ 79.242527] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.249565] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.258514] device bridge_slave_0 entered promiscuous mode [ 79.294083] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.303924] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.313821] device bridge_slave_1 entered promiscuous mode [ 79.338852] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 79.348567] IPVS: ftp: loaded support on port[0] = 21 [ 79.356045] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 79.391073] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 79.401136] team0: Port device team_slave_0 added [ 79.409793] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 79.418876] team0: Port device team_slave_1 added [ 79.427169] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 79.439681] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 79.502246] device hsr_slave_0 entered promiscuous mode [ 79.580350] device hsr_slave_1 entered promiscuous mode [ 79.663546] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 79.677820] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 79.734088] chnl_net:caif_netlink_parms(): no params data found [ 79.741593] IPVS: ftp: loaded support on port[0] = 21 [ 79.777125] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.783728] bridge0: port 2(bridge_slave_1) entered forwarding state [ 79.790787] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.797191] bridge0: port 1(bridge_slave_0) entered forwarding state [ 79.878140] chnl_net:caif_netlink_parms(): no params data found [ 79.908830] bridge0: port 1(bridge_slave_0) entered blocking state [ 79.915649] bridge0: port 1(bridge_slave_0) entered disabled state [ 79.922572] device bridge_slave_0 entered promiscuous mode [ 79.929526] bridge0: port 2(bridge_slave_1) entered blocking state [ 79.935943] bridge0: port 2(bridge_slave_1) entered disabled state [ 79.943310] device bridge_slave_1 entered promiscuous mode [ 79.964336] IPVS: ftp: loaded support on port[0] = 21 [ 79.995898] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 80.033731] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 80.106723] chnl_net:caif_netlink_parms(): no params data found [ 80.123229] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 80.130721] team0: Port device team_slave_0 added [ 80.137183] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 80.145599] team0: Port device team_slave_1 added [ 80.150907] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.157274] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.164975] device bridge_slave_0 entered promiscuous mode [ 80.176442] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.183615] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.190781] device bridge_slave_1 entered promiscuous mode [ 80.215045] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 80.222577] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 80.242099] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.249210] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.270302] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 80.279376] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 80.313435] IPVS: ftp: loaded support on port[0] = 21 [ 80.372493] device hsr_slave_0 entered promiscuous mode [ 80.421960] device hsr_slave_1 entered promiscuous mode [ 80.482006] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 80.490939] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 80.520825] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 80.528031] team0: Port device team_slave_0 added [ 80.535189] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 80.542512] team0: Port device team_slave_1 added [ 80.547805] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 80.574627] bridge0: port 1(bridge_slave_0) entered blocking state [ 80.581529] bridge0: port 1(bridge_slave_0) entered disabled state [ 80.588421] device bridge_slave_0 entered promiscuous mode [ 80.595318] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 80.635425] bridge0: port 2(bridge_slave_1) entered blocking state [ 80.642061] bridge0: port 2(bridge_slave_1) entered disabled state [ 80.649282] device bridge_slave_1 entered promiscuous mode [ 80.686040] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.700779] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 80.712905] chnl_net:caif_netlink_parms(): no params data found [ 80.772390] device hsr_slave_0 entered promiscuous mode [ 80.820521] device hsr_slave_1 entered promiscuous mode [ 80.861364] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 80.867931] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 80.875658] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 80.896250] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 80.903452] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 80.935878] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 80.943318] team0: Port device team_slave_0 added [ 80.949052] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 80.957484] team0: Port device team_slave_1 added [ 80.966381] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 80.976068] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 80.988196] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 81.012999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 81.020716] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 81.029349] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 81.039480] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 81.046140] 8021q: adding VLAN 0 to HW filter on device team0 [ 81.093957] device hsr_slave_0 entered promiscuous mode [ 81.170355] device hsr_slave_1 entered promiscuous mode [ 81.212423] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 81.219501] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 81.233590] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 81.261566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 81.269371] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 81.277480] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.283991] bridge0: port 1(bridge_slave_0) entered forwarding state [ 81.292936] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 81.301038] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 81.308819] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 81.316860] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.323221] bridge0: port 2(bridge_slave_1) entered forwarding state [ 81.335206] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.342071] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.348972] device bridge_slave_0 entered promiscuous mode [ 81.421773] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.428165] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.435403] device bridge_slave_1 entered promiscuous mode [ 81.443219] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 81.455020] chnl_net:caif_netlink_parms(): no params data found [ 81.480828] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 81.491187] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 81.516828] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 81.527177] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 81.537941] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 81.549768] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 81.559227] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 81.570854] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 81.578510] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 81.586225] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 81.598219] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 81.622169] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 81.629215] team0: Port device team_slave_0 added [ 81.635398] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 81.644614] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 81.655875] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.685381] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 81.692918] team0: Port device team_slave_1 added [ 81.698429] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 81.706449] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 81.725107] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.731668] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.738554] device bridge_slave_0 entered promiscuous mode [ 81.750549] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 81.758997] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 81.775533] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.782160] bridge0: port 2(bridge_slave_1) entered disabled state [ 81.789041] device bridge_slave_1 entered promiscuous mode [ 81.795888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 81.803937] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 81.813617] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 81.884060] device hsr_slave_0 entered promiscuous mode [ 81.931026] device hsr_slave_1 entered promiscuous mode [ 82.009555] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 82.015937] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 82.023812] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 82.031584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.038371] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.048684] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 82.055116] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 82.071756] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 82.079651] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 82.090550] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 82.103824] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 82.109897] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.118221] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 82.148753] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.157156] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 82.173406] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 82.181877] team0: Port device team_slave_0 added [ 82.188980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 82.195938] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.204538] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.212127] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.218447] bridge0: port 1(bridge_slave_0) entered forwarding state [ 82.225711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.236117] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 82.243885] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 82.251241] team0: Port device team_slave_1 added [ 82.257740] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 82.268680] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 82.279629] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 82.290920] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 82.311434] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 82.318875] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 82.327652] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.339942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.347319] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.359244] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.367405] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.373799] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.383702] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 82.389891] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.398145] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.406117] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 82.428573] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 82.437513] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.445943] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 82.453747] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 82.461663] bridge0: port 1(bridge_slave_0) entered blocking state [ 82.468039] bridge0: port 1(bridge_slave_0) entered forwarding state 11:37:37 executing program 1: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) move_pages(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000b8f000/0x1000)=nil], 0x0, &(0x7f0000000140), 0x0) [ 82.535582] device hsr_slave_0 entered promiscuous mode 11:37:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(0xffffffffffffffff, 0x10e, 0x8, &(0x7f00000000c0)=0x7fffffff, 0x4) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x10000000, 0x1fffff}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0), 0xfffffef3) read(r1, &(0x7f0000000200)=""/250, 0x50c7e3e3) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) creat(&(0x7f00000000c0)='./file0\x00', 0x0) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/context\x00', 0x2, 0x0) write$FUSE_NOTIFY_POLL(r1, &(0x7f0000000380)={0x2a5}, 0xfffffffffffffd27) write$cgroup_int(r1, &(0x7f0000000180)=0x3, 0xffffffffffffff31) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r3) r4 = creat(&(0x7f00000003c0)='./bus\x00', 0x4) fcntl$setstatus(r4, 0x4, 0x6100) truncate(&(0x7f00000000c0)='./bus\x00', 0xa00) ioctl$EVIOCGPROP(r4, 0x80404509, &(0x7f0000000140)) r5 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r4, 0x0, 0x2) sendfile(r4, r5, 0x0, 0xfffffffffffffffc) sendfile(r4, r5, &(0x7f0000000040), 0x8000fffffffe) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) ioctl$TUNSETTXFILTER(r4, 0x400454d1, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) fcntl$setownex(r4, 0xf, &(0x7f0000000680)={0x1, r6}) ioctl$sock_inet6_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000440)={@remote, 0xbd}) fstat(0xffffffffffffffff, &(0x7f00000005c0)) socket(0x10, 0x0, 0xe3) [ 82.582158] device hsr_slave_1 entered promiscuous mode [ 82.625081] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 82.633883] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 82.641351] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 82.648861] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.657962] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_0: link is not ready [ 82.666510] IPv6: ADDRCONF(NETDEV_UP): hsr_slave_1: link is not ready [ 82.676126] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 82.692605] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 82.701398] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 82.710909] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 82.723626] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 82.737623] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 82.745056] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 82.752110] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 82.759953] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 82.767776] bridge0: port 2(bridge_slave_1) entered blocking state [ 82.774153] bridge0: port 2(bridge_slave_1) entered forwarding state [ 82.781342] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 82.797533] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.806475] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 82.816886] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready 11:37:38 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x210007f7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1/file0\x00') rename(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000240)='./file1\x00') [ 82.837267] 8021q: adding VLAN 0 to HW filter on device team0 [ 82.844730] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 82.856259] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 82.867054] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 82.881347] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 82.894042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 82.902884] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 82.914900] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 82.923144] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 82.935339] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 82.945468] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 82.958142] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 82.967817] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready 11:37:38 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x210007f7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1/file0\x00') rename(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000240)='./file1\x00') [ 82.981451] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 82.991632] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 83.002505] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 83.008913] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.016914] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.025381] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.033529] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.041455] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.049285] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.057012] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.063412] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.072642] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.088284] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.097072] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.103495] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.114541] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.122116] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.134216] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 83.149155] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 83.160770] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 83.169664] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 83.177980] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready 11:37:38 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x210007f7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1/file0\x00') rename(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000240)='./file1\x00') [ 83.185709] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.198097] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.207161] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.215241] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.223558] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.232474] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 83.238499] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.251876] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 83.267558] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 83.277873] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 83.286084] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.302395] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.309988] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.318545] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.326749] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 11:37:38 executing program 1: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000280)='./file0\x00') r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) clone(0x210007f7, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1/file0\x00') rename(&(0x7f0000000100)='./file1/file0\x00', &(0x7f0000000240)='./file1\x00') [ 83.338543] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 83.355469] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 83.373453] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 83.382361] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.394989] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.402817] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.411009] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.418547] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.424958] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.432626] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.439786] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 83.449521] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 83.468529] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 83.483796] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.502229] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.512840] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 83.521210] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 83.529224] bridge0: port 2(bridge_slave_1) entered blocking state [ 83.535665] bridge0: port 2(bridge_slave_1) entered forwarding state [ 83.558966] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 83.572111] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 83.583371] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 83.594403] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.602174] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.610731] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.618464] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 83.635173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.644083] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 83.653060] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 83.663896] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 83.669927] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 83.690786] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 83.698411] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 83.717546] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 83.735957] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 83.757740] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.765190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 83.776303] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 83.787597] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 83.795531] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 83.804570] IPv6: ADDRCONF(NETDEV_UP): team0: link is not ready [ 83.811208] 8021q: adding VLAN 0 to HW filter on device team0 [ 83.818024] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 83.827025] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 83.845089] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 83.855929] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 83.867982] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 83.877472] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 83.885679] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 83.893678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 83.901899] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 83.913417] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 83.927925] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 83.936779] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 83.949973] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 83.958002] bridge0: port 1(bridge_slave_0) entered blocking state [ 83.964374] bridge0: port 1(bridge_slave_0) entered forwarding state [ 83.972437] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 83.980625] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 83.993622] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready 11:37:39 executing program 5: r0 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) write(r0, &(0x7f0000000040)="06", 0x1) sendfile(r0, r0, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000), 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, 0x0, 0x0) [ 84.025352] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 84.032891] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 84.045908] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 84.054575] bridge0: port 2(bridge_slave_1) entered blocking state [ 84.060981] bridge0: port 2(bridge_slave_1) entered forwarding state [ 84.078409] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 84.087247] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 84.097821] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 84.104340] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.111573] audit: type=1400 audit(1554982659.242:38): avc: denied { map } for pid=7162 comm="syz-executor.5" path=2F6D656D66643A23656D31232B202864656C6574656429 dev="tmpfs" ino=25297 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:tmpfs_t:s0 tclass=file permissive=1 [ 84.130200] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 84.139208] protocol 88fb is buggy, dev hsr_slave_0 [ 84.150937] protocol 88fb is buggy, dev hsr_slave_1 [ 84.152491] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.169258] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.177000] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 84.197283] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 84.211362] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 84.220360] protocol 88fb is buggy, dev hsr_slave_0 [ 84.225432] protocol 88fb is buggy, dev hsr_slave_1 [ 84.242558] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 84.259953] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 84.270865] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 84.279018] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 84.298775] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.326358] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 84.340128] protocol 88fb is buggy, dev hsr_slave_0 [ 84.345239] protocol 88fb is buggy, dev hsr_slave_1 [ 84.356154] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 84.366808] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 84.394628] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 84.419490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_hsr: link is not ready [ 84.445191] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 84.456375] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 84.463548] protocol 88fb is buggy, dev hsr_slave_0 [ 84.463598] protocol 88fb is buggy, dev hsr_slave_1 [ 84.486034] IPv6: ADDRCONF(NETDEV_UP): veth1_to_hsr: link is not ready [ 84.495082] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 84.505302] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 84.513885] hrtimer: interrupt took 41291 ns [ 84.528434] IPv6: ADDRCONF(NETDEV_UP): hsr0: link is not ready [ 84.537452] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 84.550810] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 84.572510] protocol 88fb is buggy, dev hsr_slave_0 [ 84.578739] protocol 88fb is buggy, dev hsr_slave_1 11:37:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:37:39 executing program 1: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x800000000009031, 0xffffffffffffffff, 0x0) madvise(&(0x7f000066c000/0x2000)=nil, 0x2000, 0x9) 11:37:39 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) [ 84.627207] IPv6: ADDRCONF(NETDEV_UP): vxcan1: link is not ready [ 84.663854] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 84.785939] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:40 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:40 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xb, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}}, &(0x7f00000003c0)='syzka\x00\x00\x00\x05\x00\xf3', 0x7fff, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 11:37:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:37:40 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) 11:37:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r0, 0x107, 0x12, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x8}, &(0x7f0000000200)={0x0, r1+30000000}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @local}, 0x1c) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) [ 85.735505] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:40 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:40 executing program 1: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:40 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) [ 85.798764] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 11:37:41 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:41 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) [ 85.859417] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 [ 85.884914] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:41 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xe}, 0x2c) 11:37:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) [ 85.981704] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 85.981762] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:41 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) [ 86.047424] audit: type=1400 audit(1554982661.172:39): avc: denied { create } for pid=7252 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 11:37:41 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:41 executing program 1: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) 11:37:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) shmget(0x2, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) 11:37:41 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) [ 86.175977] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:41 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00\f#\x9f\xd0\x85\xac\xc4\x9b\x81-\xb3\xd7=C\xea', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000001c0)='./file1\x00', 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000000000a01, 0x0) write$binfmt_aout(r2, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000200)) r3 = syz_open_pts(r2, 0x0) readv(r3, &(0x7f00000001c0)=[{&(0x7f0000000940)=""/4096, 0x1000}], 0x1) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}) write$cgroup_type(r1, &(0x7f0000000140)='threaded\x00', 0xffffffb2) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_setup(0x9, &(0x7f0000000080)) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000240)=""/175, 0xaf, 0x10000, &(0x7f00000000c0)={0xa, 0x4e23, 0x8, @mcast1, 0x7}, 0x1c) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f00000001c0), 0xfffffef3) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) fcntl$setstatus(r5, 0x4, 0x8d264d94b88cc547) ftruncate(0xffffffffffffffff, 0x8008200) gettid() r6 = socket$inet6(0xa, 0x400000000001, 0x0) close(r6) openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x2, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r7, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) set_robust_list(&(0x7f0000000200)={&(0x7f00000000c0)={&(0x7f0000000080)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, 0xc) setsockopt$inet6_opts(r7, 0x29, 0x3b, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x1) sendmmsg(r7, &(0x7f00000092c0), 0x4ff, 0x0) lseek(r7, 0x0, 0x0) sendto$inet6(r5, &(0x7f0000000300)="a7f53bd19b3fee223b8e4a1c6a3bc1a6c8e71463dd3b833e3951eda96f3206e9b27bbef20eacbd6e051e62bc10adcdaa82a86f7a137a16209ff3d5218cb019a9336228f002ca65ae69fe95d14896b5cf0618db12ff1edc48b7", 0x59, 0x20000000, 0x0, 0x0) 11:37:41 executing program 0: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) 11:37:41 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) [ 86.208787] audit: type=1400 audit(1554982661.222:40): avc: denied { write } for pid=7252 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 86.245354] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:41 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) 11:37:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001b00)=""/186, 0x68acda0466535383) [ 86.404319] audit: type=1400 audit(1554982661.222:41): avc: denied { read } for pid=7252 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 11:37:41 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:41 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) 11:37:41 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) [ 86.509412] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:41 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)="3900000010000900000000ae7aa77cf40000f6000000000045009db9120c007b05000300410168849ef72da102159affff55e91ee538d2fd00", 0x39}], 0x1) 11:37:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:42 executing program 0: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) 11:37:42 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:42 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 87.274055] netlink: 17 bytes leftover after parsing attributes in process `syz-executor.1'. 11:37:42 executing program 0: socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) 11:37:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:42 executing program 1: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) r0 = socket$kcm(0xa, 0x2, 0x73) sendmsg$kcm(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@nl=@unspec={0x0, 0x0, 0x0, 0x8dffffff}, 0x80, 0x0}, 0x0) [ 87.347446] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:42 executing program 0: socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) 11:37:42 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:42 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:42 executing program 0: socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d8004003000000000000", 0x23}], 0x1}, 0x0) 11:37:42 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/dev\x00') r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='projid_map\x00\xf1\x91\xf4)\x03\x7fA\x8a~\xe2\xf8\x16\xb5A\xd2\x00\x00F\xcf\xc6\xb9\xc9#\xc8\xd7S\xcdC\xe6\x8eamf\xc9\xe2l\x17a7\xa8\xcb\xaf\xea^\xab\x06\x00\x00\x00\x1bgz\xdc/vb8FB\x11ZD\xc6\x8f |\x98MbMyo\r\xd2\xac\xfd%B\x0fv\x1d.:\xa1d\xe7n>\xa7\xd8\xb8\x16\x1b\x0f\x81\x83\xdcR\x01\xca\xd3OU\xef<\x10\xe0^B\xcf') sendfile(r1, r0, &(0x7f0000000040)=0x800, 0x10001) 11:37:42 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) [ 87.528925] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:42 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:42 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:42 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 11:37:42 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 87.640014] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:42 executing program 4: r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:42 executing program 1: r0 = socket$inet6(0xa, 0x1000000000005, 0x0) getsockopt$inet_buf(r0, 0x84, 0x71, 0x0, &(0x7f0000000100)) 11:37:42 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 11:37:42 executing program 5: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:42 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 87.746606] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:42 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:42 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 11:37:42 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0xa, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x0, 0x7}, [], {0x95, 0x0, 0x0, 0xffffffc0}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) 11:37:43 executing program 5: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) [ 87.818976] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:43 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:37:43 executing program 2: r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:43 executing program 1: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000280)="2400000020002551075c0165ff0ffc020200000000100f0007e1000c080018001608f000", 0x24) 11:37:43 executing program 5: mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) [ 87.983459] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:43 executing program 1: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000280)="2400000020002551075c0165ff0ffc020200000000100f0007e1000c080018001608f000", 0x24) [ 88.030569] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:43 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:43 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 11:37:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:43 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'veth0_to_bond\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=@newlink={0x34, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r2}, [@IFLA_IFNAME={0x14, 0x4, 'C\x00\a\x00vti0\x00'}]}, 0x34}}, 0x0) [ 88.171042] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:43 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040), 0x0) 11:37:43 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:43 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:43 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:43 executing program 1: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="240000005a001f00ff03f4f9002304000a04f51108000200020100020800408001000000", 0x24) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040), 0x0) 11:37:43 executing program 5: mkdir(0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) [ 88.378210] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:43 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:43 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:43 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040), 0x0) 11:37:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:43 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:43 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 11:37:43 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, 0x0, 0x0) 11:37:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 11:37:43 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:43 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:43 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:43 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, 0x0, 0x0) 11:37:43 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) 11:37:44 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:44 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:44 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1}, 0x0) 11:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, 0x0, 0x0) [ 88.976663] 9pnet: Insufficient options for proto=fd 11:37:44 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:44 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1}, 0x0) 11:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:44 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 11:37:44 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)}], 0x1}, 0x0) 11:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) [ 89.127887] 9pnet: Insufficient options for proto=fd 11:37:44 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:44 executing program 3: mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:44 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc", 0x12}], 0x1}, 0x0) 11:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 11:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:44 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 89.324952] 9pnet: Insufficient options for proto=fd 11:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) 11:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:44 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc", 0x12}], 0x1}, 0x0) 11:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:44 executing program 3: pipe2$9p(0x0, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 11:37:44 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:44 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc", 0x12}], 0x1}, 0x0) [ 89.492215] 9pnet: Insufficient options for proto=fd 11:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:44 executing program 3: pipe2$9p(0x0, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(0x0, 0x0, 0x0) getdents64(r0, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) 11:37:44 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d800", 0x1b}], 0x1}, 0x0) 11:37:44 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 89.594784] nla_parse: 11 callbacks suppressed [ 89.597313] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:44 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 89.689901] 9pnet: Insufficient options for proto=fd 11:37:44 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d800", 0x1b}], 0x1}, 0x0) 11:37:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:44 executing program 3: pipe2$9p(0x0, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:44 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001b00)=""/186, 0x68acda0466535383) [ 89.815716] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:45 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 89.877694] 9pnet: Insufficient options for proto=fd 11:37:45 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d800", 0x1b}], 0x1}, 0x0) 11:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:45 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001b00)=""/186, 0x68acda0466535383) 11:37:45 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:45 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d80040030000", 0x1f}], 0x1}, 0x0) [ 90.003539] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, 0x0, 0x5, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:45 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 11:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x0, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:45 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:45 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d80040030000", 0x1f}], 0x1}, 0x0) 11:37:45 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(0x0, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 90.181859] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 11:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x0, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) 11:37:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:45 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:45 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:45 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d80040030000", 0x1f}], 0x1}, 0x0) 11:37:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x14, r1, 0x0, 0x0, 0x0, {0xc}}, 0x14}}, 0x0) 11:37:45 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents64(r0, 0x0, 0x0) [ 90.419084] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:45 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d800400300000000", 0x21}], 0x1}, 0x0) 11:37:45 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:45 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:45 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:45 executing program 4: mknod(&(0x7f0000000040)='./file0\x00', 0x800b, 0x202) mknod(&(0x7f00000001c0)='./file0\x00', 0x8000, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0) r1 = semget$private(0x0, 0x4, 0x80) semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f00000000c0)=""/211) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) write(r2, &(0x7f0000000040)='h', 0x1) fchdir(r0) mknod(&(0x7f0000000080)='./file0\x00', 0x28, 0x4) sendto$unix(r2, &(0x7f0000001a40)="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", 0x1000, 0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) 11:37:45 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d800400300000000", 0x21}], 0x1}, 0x0) 11:37:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x0, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:45 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 90.609797] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:45 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:45 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d800400300000000", 0x21}], 0x1}, 0x0) 11:37:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000300)="390000001100090468fe0700000000000700ff3f07000000450001070000001419001a00040002000700c302739bdd2a1ffc00000000000000", 0x39}], 0x1) 11:37:45 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:45 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:45 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d80040030000000000", 0x22}], 0x1}, 0x0) 11:37:45 executing program 4: readlink(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0), 0xfffffcf0}], 0x3c1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f0000000000)='./file1\x00', &(0x7f0000000040)='.\x00') 11:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 90.846645] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:46 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet(0x10, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) 11:37:46 executing program 4: unshare(0x600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:46 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d80040030000000000", 0x22}], 0x1}, 0x0) 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) 11:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 11:37:46 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 91.046103] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:46 executing program 4: unshare(0x600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:46 executing program 0: r0 = socket$kcm(0x10, 0x1000000000000002, 0x0) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="23000000420081aee405e9a40000e9bd33cc00000000c6ff07d80040030000000000", 0x22}], 0x1}, 0x0) 11:37:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 11:37:46 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:46 executing program 4: unshare(0x600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1ff) [ 91.189940] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:46 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:46 executing program 0: r0 = eventfd2(0x0, 0x0) r1 = epoll_create1(0x0) epoll_wait(r1, &(0x7f0000000080)=[{}], 0x1, 0x341) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0x40000004}) 11:37:46 executing program 1: lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, 0x0, 0x0) 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:46 executing program 1: lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:46 executing program 4: unshare(0x600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1ff) [ 91.368667] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 11:37:46 executing program 0: r0 = socket$inet(0x2, 0x1003, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x81c8, 0x401) r1 = open(&(0x7f00000019c0)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r1, 0x0) connect$inet(r0, &(0x7f0000000000), 0xce) 11:37:46 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:46 executing program 4: unshare(0x600) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:46 executing program 1: lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 91.560777] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:46 executing program 4: unshare(0x600) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:46 executing program 0: clock_getres(0xfff7fefffffffff6, 0x0) 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:46 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:46 executing program 1: creat(0x0, 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 11:37:46 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x2f77, 0x1) openat$fuse(0xffffffffffffff9c, &(0x7f0000000840)='/dev/fuse\x00', 0x2, 0x0) pipe(&(0x7f0000000180)) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:46 executing program 4: unshare(0x600) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:46 executing program 1: creat(0x0, 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 91.751786] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:46 executing program 5: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) write$P9_RAUTH(r0, &(0x7f0000000180)={0x14}, 0x14) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 11:37:47 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:47 executing program 1: creat(0x0, 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:47 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 11:37:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') [ 91.992904] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(0x0, &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:47 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) [ 92.076489] audit: type=1400 audit(1554982667.202:42): avc: denied { map } for pid=7960 comm="syz-executor.0" path="/dev/ashmem" dev="devtmpfs" ino=15257 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 11:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) 11:37:47 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 11:37:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(0x0, &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') [ 92.246526] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:47 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:47 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 11:37:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(0x0, &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 92.432550] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:47 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:47 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) 11:37:47 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:47 executing program 5: creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:47 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x1ff) 11:37:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) [ 92.628405] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py]マゥム自 11:37:47 executing program 5: creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:47 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:47 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 11:37:47 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) 11:37:47 executing program 5: creat(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', 0x0, &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 11:37:48 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{}], 0x1}, 0x0) 11:37:48 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 11:37:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) 11:37:48 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:48 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079816ecfa9d18ea9"], 0x1f) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 11:37:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:48 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 11:37:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e2800", 0x26}], 0x1}, 0x0) 11:37:48 executing program 0: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:48 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:48 executing program 0: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 11:37:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 11:37:48 executing program 0: ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 11:37:48 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)) 11:37:48 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1", 0x39}], 0x1}, 0x0) 11:37:48 executing program 4: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:48 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:48 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) close(r3) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000004c0)={0x1, 0xd8, &(0x7f00000003c0)="bd30f6f3486a00ecefe2303e47a17814f44b78efaf0f8cd3e8b04b98a8a43d228c7fd161ccbdc65665fb305f5ee1ed854452ab81f99770594be3a958629e48b17852acfc55670bfc56a8a66fa47ab3a908386744c9dcb94a289835ee167a67d32ca4e3162e3b71f6bae86702a7dc2d660099219df9825ea5eeb7f99f869a43b3b427067c35c316d894567795245b22a0d9f7800739b0e32d128ec9b5877bce5deec3d436b5505237eb37735f51b8e941a43f4f0bd588455d21c570f8c903f4d2d335f6764fbb14b2b886ddfc1a395980dfcbfd3e0468a40a"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x100) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0x0) 11:37:48 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:48 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 11:37:49 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[], 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:49 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:49 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 11:37:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:49 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[], 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:49 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) close(r3) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000004c0)={0x1, 0xd8, &(0x7f00000003c0)="bd30f6f3486a00ecefe2303e47a17814f44b78efaf0f8cd3e8b04b98a8a43d228c7fd161ccbdc65665fb305f5ee1ed854452ab81f99770594be3a958629e48b17852acfc55670bfc56a8a66fa47ab3a908386744c9dcb94a289835ee167a67d32ca4e3162e3b71f6bae86702a7dc2d660099219df9825ea5eeb7f99f869a43b3b427067c35c316d894567795245b22a0d9f7800739b0e32d128ec9b5877bce5deec3d436b5505237eb37735f51b8e941a43f4f0bd588455d21c570f8c903f4d2d335f6764fbb14b2b886ddfc1a395980dfcbfd3e0468a40a"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x100) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0x0) 11:37:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268", 0x43}], 0x1}, 0x0) 11:37:49 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:49 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[], 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 11:37:49 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 11:37:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:49 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:49 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) close(r3) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000004c0)={0x1, 0xd8, &(0x7f00000003c0)="bd30f6f3486a00ecefe2303e47a17814f44b78efaf0f8cd3e8b04b98a8a43d228c7fd161ccbdc65665fb305f5ee1ed854452ab81f99770594be3a958629e48b17852acfc55670bfc56a8a66fa47ab3a908386744c9dcb94a289835ee167a67d32ca4e3162e3b71f6bae86702a7dc2d660099219df9825ea5eeb7f99f869a43b3b427067c35c316d894567795245b22a0d9f7800739b0e32d128ec9b5877bce5deec3d436b5505237eb37735f51b8e941a43f4f0bd588455d21c570f8c903f4d2d335f6764fbb14b2b886ddfc1a395980dfcbfd3e0468a40a"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x100) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0x0) 11:37:49 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x0) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:49 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(0x0, &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055", 0x48}], 0x1}, 0x0) 11:37:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) 11:37:49 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:49 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:49 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:49 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(0x0, &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) 11:37:50 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) close(r3) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000004c0)={0x1, 0xd8, &(0x7f00000003c0)="bd30f6f3486a00ecefe2303e47a17814f44b78efaf0f8cd3e8b04b98a8a43d228c7fd161ccbdc65665fb305f5ee1ed854452ab81f99770594be3a958629e48b17852acfc55670bfc56a8a66fa47ab3a908386744c9dcb94a289835ee167a67d32ca4e3162e3b71f6bae86702a7dc2d660099219df9825ea5eeb7f99f869a43b3b427067c35c316d894567795245b22a0d9f7800739b0e32d128ec9b5877bce5deec3d436b5505237eb37735f51b8e941a43f4f0bd588455d21c570f8c903f4d2d335f6764fbb14b2b886ddfc1a395980dfcbfd3e0468a40a"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x100) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) write$binfmt_script(r5, &(0x7f0000000300)=ANY=[], 0x0) 11:37:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:50 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(0x0, &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:50 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x0) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f", 0x4a}], 0x1}, 0x0) 11:37:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:50 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 11:37:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:50 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a7"], 0x10) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') [ 95.199165] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァ 11:37:50 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) close(r3) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000004c0)={0x1, 0xd8, &(0x7f00000003c0)="bd30f6f3486a00ecefe2303e47a17814f44b78efaf0f8cd3e8b04b98a8a43d228c7fd161ccbdc65665fb305f5ee1ed854452ab81f99770594be3a958629e48b17852acfc55670bfc56a8a66fa47ab3a908386744c9dcb94a289835ee167a67d32ca4e3162e3b71f6bae86702a7dc2d660099219df9825ea5eeb7f99f869a43b3b427067c35c316d894567795245b22a0d9f7800739b0e32d128ec9b5877bce5deec3d436b5505237eb37735f51b8e941a43f4f0bd588455d21c570f8c903f4d2d335f6764fbb14b2b886ddfc1a395980dfcbfd3e0468a40a"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x100) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) write$cgroup_type(r5, &(0x7f0000000200)='threaded\x00', 0x175d900f) 11:37:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(0x0, &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:50 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) 11:37:50 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a7"], 0x10) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:50 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) 11:37:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(0x0, &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x10, 0x2, 0x0) sendmsg(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000250007031dfffd946fa2830020200a0009000300001d85680c1ba3a20400ff7e280000002600ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15", 0x4b}], 0x1}, 0x0) [ 95.406262] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァ 11:37:50 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a7"], 0x10) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:50 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', 0x0, 0x0, 0x0) [ 95.576432] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァ 11:37:50 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) close(r3) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000004c0)={0x1, 0xd8, &(0x7f00000003c0)="bd30f6f3486a00ecefe2303e47a17814f44b78efaf0f8cd3e8b04b98a8a43d228c7fd161ccbdc65665fb305f5ee1ed854452ab81f99770594be3a958629e48b17852acfc55670bfc56a8a66fa47ab3a908386744c9dcb94a289835ee167a67d32ca4e3162e3b71f6bae86702a7dc2d660099219df9825ea5eeb7f99f869a43b3b427067c35c316d894567795245b22a0d9f7800739b0e32d128ec9b5877bce5deec3d436b5505237eb37735f51b8e941a43f4f0bd588455d21c570f8c903f4d2d335f6764fbb14b2b886ddfc1a395980dfcbfd3e0468a40a"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x100) r4 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r5, 0x4, 0x6100) write$FUSE_INIT(r4, &(0x7f0000000000)={0x50}, 0x50) 11:37:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(0x0, &(0x7f00000000c0)=@known='security.capability\x00', &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:50 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f00000000c0)="eaff000000000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000080)="eaff125c00000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000040)="eaff125c00000000", 0x8) 11:37:50 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', 0x0, 0x0, 0x0) 11:37:50 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079"], 0x18) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:50 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = socket$alg(0x26, 0x5, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000640)=""/250, &(0x7f00000000c0)=0xfa) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000180)={0x2c, @multicast1, 0x4e20, 0x4, 'lblcr\x00', 0x2c, 0x0, 0x1}, 0x2c) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=0x0, &(0x7f0000000240)=0x4) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x100000f, 0x2013, r2, 0x500000) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)) bind$alg(r1, &(0x7f0000000540)={0x26, 'rng\x00', 0x0, 0x0, 'ansi_cprng\x00'}, 0x58) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000400)=ANY=[@ANYBLOB="460000005d88c2b1baa38e16a0aa191513f20c3e52f0d0e4d1134ef9c2538cf23664dc411400088b24aebcd6246c561e9557beb2b787563692c1c6890a2d"], 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, &(0x7f0000000040)="fb15e638f876a49052a7a95d1ce04045", 0x350) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000280)={r3, 0x3c, "ec4c0f63b205d3e565c2891e5e90b84691b57b5b10838fbced65de3e4d6c3ed0952432d771599a8de1fc2c1030d6dd75092475780f4a15d84177df13"}, 0x0) write$binfmt_elf32(r1, &(0x7f00000003c0)=ANY=[], 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000300)='nbd\x00') poll(&(0x7f0000000200)=[{r1, 0x200}], 0x1, 0x3) select(0x40, &(0x7f0000040e40), &(0x7f0000040e80), 0x0, &(0x7f0000040ec0)={0xfffffffffffffff7}) setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000500)={0x2, 0x0, @rand_addr=0x100000000}, 0x10) tee(r1, 0xffffffffffffffff, 0x2, 0xe) socket$bt_hidp(0x1f, 0x3, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x289201f098c5f1b3) bind$inet6(r4, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) getsockopt$sock_linger(r4, 0x1, 0xd, &(0x7f0000000040), &(0x7f0000000180)=0x8) listen(r4, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$rds(0x15, 0x5, 0x0) 11:37:50 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') 11:37:50 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:50 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079"], 0x18) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) [ 95.746662] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py 11:37:50 executing program 5: creat(&(0x7f0000000080)='./file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=@known='security.capability\x00', 0x0, 0x0, 0x0) 11:37:51 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(0xffffffffffffffff, 0x40087708, &(0x7f00000011c0)='\x00\x00\x00\x80\x00\x00\x80\x00\x00') [ 95.889250] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py 11:37:51 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e70e) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) close(r3) syz_genetlink_get_family_id$nbd(0x0) sendmsg$NBD_CMD_STATUS(r1, 0x0, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000004c0)={0x1, 0xd8, &(0x7f00000003c0)="bd30f6f3486a00ecefe2303e47a17814f44b78efaf0f8cd3e8b04b98a8a43d228c7fd161ccbdc65665fb305f5ee1ed854452ab81f99770594be3a958629e48b17852acfc55670bfc56a8a66fa47ab3a908386744c9dcb94a289835ee167a67d32ca4e3162e3b71f6bae86702a7dc2d660099219df9825ea5eeb7f99f869a43b3b427067c35c316d894567795245b22a0d9f7800739b0e32d128ec9b5877bce5deec3d436b5505237eb37735f51b8e941a43f4f0bd588455d21c570f8c903f4d2d335f6764fbb14b2b886ddfc1a395980dfcbfd3e0468a40a"}) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu\x00', 0x200002, 0x0) creat(&(0x7f0000000100)='./bus\x00', 0x100) open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r4 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fcntl$setstatus(r4, 0x4, 0x6100) 11:37:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x6, 0x209e1e, 0x3, 0x1}, 0x2c) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000040)={r0, 0x0}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000340)={r0, &(0x7f0000000380), 0x0}, 0x18) unlink(&(0x7f0000000400)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000440)={r0, 0x0, 0x0}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0xffffffffffffffbb) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r0, 0x28, &(0x7f0000000200)}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.stat\x00', 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r1, 0x0, 0x98, 0x0, &(0x7f0000000280)="67c2e34731a1b1fa20cbbc9ff4ecd97a1fc01085b687bfcc4ad52fcca73cebda7c534949db9433992e06a10ffe863704a802c7aa0628f0c6e0202f3abb5283600f721f24cf61a06a072f10346e25b3ee47e3791bf44dc471d9735c6cca13aa4a702006489aa512097b6a32581629415e8c00bfc23de3d2f609765e8ed49d0134bd1d17221dca7db0b8035df35b6ae2a98522647eee1cc715", 0x0, 0x4}, 0x28) bpf$MAP_CREATE(0x0, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f00000001c0), 0x12) write$cgroup_subtree(r3, &(0x7f0000000000)={[{0x0, 'memory', 0x4002}]}, 0x201600) 11:37:51 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) 11:37:51 executing program 3: pipe2$9p(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$P9_RLERRORu(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="2300000007ffff160065747a306526a745b80ce686829079"], 0x18) mount$9p_fd(0x0, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)='9p\x00', 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000='version=9p2000'}]}}) 11:37:51 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000b4508a)='/dev/ashmem\x00', 0x0, 0x0) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x10000) mmap(&(0x7f00006ff000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$ASHMEM_SET_NAME(r0, 0x40087708, 0x0) 11:37:51 executing program 1: creat(&(0x7f0000000080)='./file0\x00', 0x0) lsetxattr(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)=@known='trusted.overlay.upper\x00', &(0x7f0000000600)='&!(-wlan1vboxnet1selfeth1\x00', 0x1a, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000100)='\x00\x00\x00\x02\x01\x00\x00\x00\x00\x00\x00\x01\x04\x00\x00\x00\x00\x00\x00\x00', 0x14, 0x0) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f0000000000)=@known='trusted.overlay.upper\x00', &(0x7f0000000200)='vboxnet0\\bdev\',@selinuxvmnet1wlan1#\x16!posix_acl_accessvboxnet1.trusted*$vmnet0\x80&proc@%(\x00', 0x57, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 96.081749] 9pnet: p9_errstr2errno: server reported unknown error etz0e&ァEク 諞py [ 96.500776] kasan: CONFIG_KASAN_INLINE enabled [ 96.505477] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 96.513187] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 96.519424] Modules linked in: [ 96.522605] CPU: 1 PID: 8439 Comm: syz-executor.2 Not tainted 4.14.111 #1 [ 96.529529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 96.538869] task: ffff888067ac6740 task.stack: ffff888067ad0000 [ 96.544937] RIP: 0010:rb_erase+0x29/0x1c10 [ 96.549153] RSP: 0018:ffff888067ad79d0 EFLAGS: 00010282 [ 96.554534] RAX: dffffc0000000000 RBX: ffff88807e805430 RCX: ffffc9000905e000 [ 96.561793] RDX: 0000000000000001 RSI: ffffffff89246880 RDI: 0000000000000008 [ 96.569057] RBP: ffff888067ad7a18 R08: 0000000000003bf8 R09: ffffffff88c96380 [ 96.576308] R10: ffff888067ac6fe8 R11: ffff888067ac6740 R12: 0000000000000000 [ 96.583557] R13: ffff8880680c5470 R14: 0000000000000000 R15: ffffffff867a2220 [ 96.590837] FS: 00007f6316b54700(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 96.599049] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 96.604915] CR2: 000000002100003f CR3: 00000000948f9000 CR4: 00000000001406e0 [ 96.612176] Call Trace: [ 96.614756] integrity_inode_free+0x126/0x320 [ 96.619236] security_inode_free+0x19/0x90 [ 96.623473] __destroy_inode+0x1ef/0x4e0 [ 96.627526] destroy_inode+0x50/0x130 [ 96.631320] evict+0x3e9/0x630 [ 96.634503] iput+0x476/0x900 [ 96.637600] ? ext4_nfs_commit_metadata+0x2f0/0x2f0 [ 96.642611] ext4_ioctl+0x15f1/0x38b0 [ 96.646443] ? avc_ss_reset+0x110/0x110 [ 96.650430] ? ext4_ioctl_setflags+0x5d0/0x5d0 [ 96.655008] ? trace_hardirqs_on+0x10/0x10 [ 96.659241] ? __might_fault+0x110/0x1d0 [ 96.663312] ? __might_sleep+0x93/0xb0 [ 96.667190] ? __fget+0x210/0x370 [ 96.670637] ? ext4_ioctl_setflags+0x5d0/0x5d0 [ 96.683905] do_vfs_ioctl+0x7b9/0x1070 [ 96.687795] ? selinux_file_mprotect+0x5d0/0x5d0 [ 96.692549] ? lock_downgrade+0x6e0/0x6e0 [ 96.696694] ? ioctl_preallocate+0x1c0/0x1c0 [ 96.701106] ? __fget+0x237/0x370 [ 96.705677] ? security_file_ioctl+0x8f/0xc0 [ 96.710079] SyS_ioctl+0x8f/0xc0 [ 96.713436] ? do_vfs_ioctl+0x1070/0x1070 [ 96.717576] do_syscall_64+0x1eb/0x630 [ 96.721469] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 96.726310] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 96.731497] RIP: 0033:0x4582f9 [ 96.734673] RSP: 002b:00007f6316b53c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 96.742372] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00000000004582f9 [ 96.749628] RDX: 0000000000000000 RSI: 0000000000006611 RDI: 0000000000000005 [ 96.756887] RBP: 000000000073c040 R08: 0000000000000000 R09: 0000000000000000 [ 96.764146] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6316b546d4 [ 96.771445] R13: 00000000004c046f R14: 00000000004d2460 R15: 00000000ffffffff [ 96.778730] Code: 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 41 57 41 56 49 89 fe 48 83 c7 08 48 89 fa 41 55 48 c1 ea 03 41 54 53 48 83 ec 20 <80> 3c 02 00 0f 85 0c 11 00 00 49 8d 7e 10 4d 8b 7e 08 48 b8 00 [ 96.798038] RIP: rb_erase+0x29/0x1c10 RSP: ffff888067ad79d0 [ 96.803899] ---[ end trace e0a27b4ae667e15d ]--- [ 96.808652] Kernel panic - not syncing: Fatal exception [ 96.815697] Kernel Offset: disabled [ 96.819326] Rebooting in 86400 seconds..