x7f00000003c0)='memory.stat\x00', 0x0, 0x0) io_submit(r1, 0x3, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f0000000040), 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x100000000, r0, &(0x7f0000000280)="59605b98b72f5e705981153df2eb2cafbae36b5e476df3c2028ef3650e2f115068017116c72ad29bcb11245b3b7231dd9cc69ec07814e88226b92be11b5329c3acb11bda08e0d07c5c55ba230cede37bea6a9f15daa67684fef35d7126e111cdfed1cc323f1864c4ea591453bb2be3afe27025c3f6149c961f69406f64e06b660dd23e2d610df77aa5e01a7c882ad67f8bae00275700837e4cd18ee68f7752e5f91688056fef71b252c700abb1574b", 0xaf, 0x8000, 0x0, 0x1, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x527d844e, r0, &(0x7f0000000340)="5a46580d0069319415dbc8abd06f98c240c0a82454494149c3f8a2d41a3750db5cadc5afb1a47230493495137c451652deb2452c5972ae0e42d165dd8b96344e4df31b17b772d3a5d6c6b3c1b552dfc4acf39acb26bdb568d9a5c6f0cd47b0dc0a5c30c6a2ca1a002264", 0x6a, 0xdc, 0x0, 0x0, r4}]) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) sendfile(r0, r0, 0x0, 0x8800000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fadvise64(r4, 0x0, 0x3ff, 0x5) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") 00:15:54 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:15:55 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r3, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000ffeffffe) 00:15:55 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:55 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:55 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:15:55 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:15:55 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8004002, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) r2 = dup2(r0, r0) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='memory.stat\x00', 0x0, 0x0) io_submit(r1, 0x3, &(0x7f0000000440)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x6, 0x4, r0, &(0x7f0000000040), 0x0, 0x2, 0x0, 0x0, r2}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x7, 0x100000000, r0, &(0x7f0000000280)="59605b98b72f5e705981153df2eb2cafbae36b5e476df3c2028ef3650e2f115068017116c72ad29bcb11245b3b7231dd9cc69ec07814e88226b92be11b5329c3acb11bda08e0d07c5c55ba230cede37bea6a9f15daa67684fef35d7126e111cdfed1cc323f1864c4ea591453bb2be3afe27025c3f6149c961f69406f64e06b660dd23e2d610df77aa5e01a7c882ad67f8bae00275700837e4cd18ee68f7752e5f91688056fef71b252c700abb1574b", 0xaf, 0x8000, 0x0, 0x1, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x527d844e, r0, &(0x7f0000000340)="5a46580d0069319415dbc8abd06f98c240c0a82454494149c3f8a2d41a3750db5cadc5afb1a47230493495137c451652deb2452c5972ae0e42d165dd8b96344e4df31b17b772d3a5d6c6b3c1b552dfc4acf39acb26bdb568d9a5c6f0cd47b0dc0a5c30c6a2ca1a002264", 0x6a, 0xdc, 0x0, 0x0, r4}]) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)) sendfile(r0, r0, 0x0, 0x8800000) r5 = socket$inet_udplite(0x2, 0x2, 0x88) fadvise64(r4, 0x0, 0x3ff, 0x5) ioctl(r5, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") 00:15:56 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r3, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000ffeffffe) 00:15:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:15:56 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:56 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:56 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(r1) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000280)={{0x2, 0x4e21, @broadcast}, {0x1, @random="f8ebca7fbf79"}, 0x40, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'bond0\x00'}) r2 = socket$netlink(0x10, 0x3, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f0000000080)=0xe8) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="f5942578f005dd3b00a5e2547a4e1a2ea0ed2a223aad468ab972c6120c1f5db5a81137fbdd0000448bb658eced0a852e85194aee2dab3ee4ce1cf54ba340caa9dd7c84a7cef0e2ff79eeaf6bcd03e00dca99417c0dffe24bd02389e55694d44d166f6ef8938b909004ca3110ff819bd40c2b9033f2260864580becca345d7841f1b6afa9a27d9ba9d4cd6b9ffbef4ddbc149734b9854f54954526f364228fa634c6ad6086a59bf49eb8569e94c1fe5c0f812", @ANYRESDEC=r3, @ANYBLOB="2c6d61736a8c5e4d41595f57524954452c7375626a5f75734c723d7766646e6f2c646f6e745f6d6561737572652c00"]) recvmmsg(r2, &(0x7f0000008c80)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x0, 0x0) chmod(&(0x7f0000000240)='./file0\x00', 0x80) write$P9_RVERSION(r1, &(0x7f0000000040)={0x15, 0x65, 0xffff, 0x0, 0x8, '9P2000.u'}, 0x15) 00:15:56 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:15:56 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:15:57 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 542.727324] 9pnet: Insufficient options for proto=fd [ 542.816566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65381 sclass=netlink_route_socket pig=20086 comm=syz-executor.0 00:15:57 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:15:57 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:15:57 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:15:57 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 543.487492] 9pnet: Insufficient options for proto=fd 00:15:57 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 543.532745] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65381 sclass=netlink_route_socket pig=20116 comm=syz-executor.0 00:15:58 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:58 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 543.749178] kauditd_printk_skb: 355 callbacks suppressed [ 543.749185] audit: type=1400 audit(1566087358.108:18254): avc: denied { map } for pid=20118 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:15:58 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 543.931390] audit: type=1400 audit(1566087358.108:18255): avc: denied { map } for pid=20118 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:15:58 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 544.137512] audit: type=1400 audit(1566087358.148:18256): avc: denied { map } for pid=20118 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 544.356952] audit: type=1400 audit(1566087358.148:18257): avc: denied { map } for pid=20118 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 544.434203] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.465285] audit: audit_lost=515 audit_rate_limit=0 audit_backlog_limit=64 [ 544.480746] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.489575] audit: audit_lost=516 audit_rate_limit=0 audit_backlog_limit=64 [ 544.498295] audit: audit_backlog=65 > audit_backlog_limit=64 [ 544.508278] audit: type=1400 audit(1566087358.148:18258): avc: denied { map } for pid=20118 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:15:58 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(0xffffffffffffffff, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:15:58 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:15:59 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:59 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:59 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:15:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:15:59 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:59 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:15:59 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:00 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x0) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:00 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:00 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:00 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0x0, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:00 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:00 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:00 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:00 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:01 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x0) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:01 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) 00:16:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:01 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:01 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0x0, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:01 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) 00:16:01 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:01 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:02 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) 00:16:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:02 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x0) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:02 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:02 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:02 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0x0, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:02 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:02 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:02 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 548.758444] kauditd_printk_skb: 346 callbacks suppressed [ 548.758450] audit: type=1400 audit(1566087363.118:18589): avc: denied { map } for pid=20270 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:03 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000ffeffffe) [ 548.879319] audit: type=1400 audit(1566087363.138:18590): avc: denied { map } for pid=20277 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:03 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 548.947844] audit: type=1400 audit(1566087363.158:18591): avc: denied { map } for pid=20270 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 548.983690] audit: type=1400 audit(1566087363.178:18592): avc: denied { map } for pid=20277 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 549.011072] audit: type=1400 audit(1566087363.178:18593): avc: denied { map } for pid=20277 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:03 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 549.119171] audit: type=1400 audit(1566087363.178:18594): avc: denied { map } for pid=20277 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 549.229114] audit: type=1400 audit(1566087363.198:18595): avc: denied { map } for pid=20277 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:03 executing program 1: lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 549.366032] audit: type=1400 audit(1566087363.218:18597): avc: denied { map } for pid=20277 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:03 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x0, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 549.504570] audit: type=1400 audit(1566087363.218:18596): avc: denied { read } for pid=20260 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 549.580629] audit: type=1400 audit(1566087363.228:18598): avc: denied { map } for pid=20277 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:04 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:04 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:04 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000ffeffffe) 00:16:04 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:04 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:04 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x0, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:05 executing program 1: lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:05 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:05 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(0xffffffffffffffff, r4, 0x0, 0x8000ffeffffe) 00:16:05 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:06 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x0, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:06 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:06 executing program 1: lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:06 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 00:16:06 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8000ffeffffe) 00:16:06 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 00:16:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) 00:16:07 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x0, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:07 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:07 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:07 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8000ffeffffe) 00:16:07 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:07 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 553.761158] kauditd_printk_skb: 355 callbacks suppressed [ 553.761165] audit: type=1400 audit(1566087368.128:18954): avc: denied { map } for pid=20413 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 553.884628] audit: type=1400 audit(1566087368.128:18955): avc: denied { map } for pid=20415 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:08 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 553.959789] audit: type=1400 audit(1566087368.158:18956): avc: denied { map } for pid=20415 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 554.008755] audit: type=1400 audit(1566087368.168:18957): avc: denied { map } for pid=20415 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:08 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x0, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:08 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, 0xffffffffffffffff, 0x0, 0x8000ffeffffe) [ 554.043852] audit: type=1400 audit(1566087368.168:18958): avc: denied { map } for pid=20415 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:08 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:08 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 554.140066] audit: type=1400 audit(1566087368.178:18959): avc: denied { map } for pid=20413 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 554.192540] audit: type=1400 audit(1566087368.188:18960): avc: denied { map } for pid=20413 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:08 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 554.303402] audit: type=1400 audit(1566087368.198:18961): avc: denied { map } for pid=20415 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:08 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x44a}, 0x28) [ 554.457223] audit: type=1400 audit(1566087368.208:18962): avc: denied { map } for pid=20415 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 554.609118] audit: type=1400 audit(1566087368.218:18964): avc: denied { map } for pid=20415 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x44a}, 0x28) 00:16:09 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x0, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:09 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:09 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x0) 00:16:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, 0x0, 0x0, 0x44a}, 0x28) 00:16:09 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:10 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x44a}, 0x28) 00:16:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:10 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0x0, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:10 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x0) 00:16:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x44a}, 0x28) 00:16:11 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f00000006c0), 0x0, 0x44a}, 0x28) 00:16:11 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:11 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0x0, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:11 executing program 5: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x0) 00:16:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0300000d69", 0x0, 0x44a}, 0x28) 00:16:11 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0300000d69", 0x0, 0x44a}, 0x28) 00:16:12 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:12 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0x0, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x7, 0x0, &(0x7f00000006c0)="b9ff0300000d69", 0x0, 0x44a}, 0x28) 00:16:12 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:12 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40", 0x0, 0x44a}, 0x28) 00:16:13 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 558.791865] kauditd_printk_skb: 339 callbacks suppressed [ 558.791872] audit: type=1400 audit(1566087373.158:19303): avc: denied { map } for pid=20544 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:13 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x0, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 558.959059] audit: type=1400 audit(1566087373.158:19304): avc: denied { map } for pid=20545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:13 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40", 0x0, 0x44a}, 0x28) [ 559.059999] audit: type=1400 audit(1566087373.158:19305): avc: denied { map } for pid=20545 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 559.169632] audit: type=1400 audit(1566087373.168:19306): avc: denied { map } for pid=20545 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:13 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 559.283530] audit: type=1400 audit(1566087373.168:19307): avc: denied { map } for pid=20544 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:13 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 559.366908] audit: type=1400 audit(1566087373.178:19308): avc: denied { map } for pid=20545 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 559.438936] audit: type=1400 audit(1566087373.178:19309): avc: denied { map } for pid=20544 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xb, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40", 0x0, 0x44a}, 0x28) [ 559.612960] audit: type=1400 audit(1566087373.198:19310): avc: denied { map } for pid=20544 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:14 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:14 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 559.781712] audit: type=1400 audit(1566087373.198:19311): avc: denied { map } for pid=20545 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:14 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x0, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 559.958078] audit: audit_backlog=65 > audit_backlog_limit=64 00:16:14 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:14 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02c", 0x0, 0x44a}, 0x28) 00:16:14 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:14 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) 00:16:14 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:14 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02c", 0x0, 0x44a}, 0x28) 00:16:15 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:15 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:15 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) 00:16:15 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x0, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:15 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xd, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02c", 0x0, 0x44a}, 0x28) 00:16:15 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:15 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) 00:16:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0}, 0x28) 00:16:16 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:16 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:16 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0}, 0x28) 00:16:16 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x0, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:16 executing program 3: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:16 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0}, 0x28) 00:16:16 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:17 executing program 2: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:17 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:17 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:17 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:17 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x0, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:17 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:17 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:17 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:18 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:16:18 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) [ 563.814741] kauditd_printk_skb: 353 callbacks suppressed [ 563.814748] audit: type=1400 audit(1566087378.178:19657): avc: denied { map } for pid=20701 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:18 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:18 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x0, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 564.015425] audit: type=1400 audit(1566087378.188:19658): avc: denied { map } for pid=20701 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 564.090078] audit: type=1400 audit(1566087378.218:19659): avc: denied { map } for pid=20701 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:18 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:18 executing program 5 (fault-call:3 fault-nth:0): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:18 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 564.245641] audit: type=1400 audit(1566087378.218:19660): avc: denied { map } for pid=20699 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:18 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 564.410082] audit: type=1400 audit(1566087378.218:19661): avc: denied { map } for pid=20701 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:18 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:18 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 564.588443] audit: type=1400 audit(1566087378.228:19662): avc: denied { map } for pid=20699 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 564.800507] FAULT_INJECTION: forcing a failure. [ 564.800507] name failslab, interval 1, probability 0, space 0, times 0 [ 564.816219] audit: type=1400 audit(1566087378.288:19663): avc: denied { create } for pid=20703 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 564.959575] CPU: 0 PID: 20735 Comm: syz-executor.5 Not tainted 4.14.139 #35 [ 564.966684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 564.976035] Call Trace: [ 564.978620] dump_stack+0x138/0x19c [ 564.982254] should_fail.cold+0x10f/0x159 [ 564.986400] should_failslab+0xdb/0x130 [ 564.990384] __kmalloc+0x2f0/0x7a0 [ 564.994046] ? lock_downgrade+0x6e0/0x6e0 [ 564.998271] ? bpf_test_init.isra.0+0x7c/0xe0 [ 565.002759] bpf_test_init.isra.0+0x7c/0xe0 [ 565.004153] audit: type=1400 audit(1566087378.288:19664): avc: denied { write } for pid=20703 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 565.007068] bpf_prog_test_run_skb+0xe5/0x9a0 [ 565.007081] ? __fget_light+0x172/0x1f0 [ 565.007091] ? bpf_test_init.isra.0+0xe0/0xe0 [ 565.044367] ? fput+0xd4/0x150 [ 565.047551] ? __bpf_prog_get+0x153/0x1a0 [ 565.051691] SyS_bpf+0x749/0x38f3 [ 565.055133] ? bpf_test_init.isra.0+0xe0/0xe0 [ 565.058425] audit: audit_backlog=65 > audit_backlog_limit=64 [ 565.059615] ? bpf_prog_get+0x20/0x20 [ 565.059628] ? wait_for_completion+0x420/0x420 [ 565.059635] ? __sb_end_write+0xc1/0x100 [ 565.059646] ? fput+0xd4/0x150 [ 565.065522] audit: audit_lost=525 audit_rate_limit=0 audit_backlog_limit=64 [ 565.069206] ? SyS_write+0x15e/0x230 [ 565.069223] ? bpf_prog_get+0x20/0x20 [ 565.069233] do_syscall_64+0x1e8/0x640 [ 565.099403] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 565.104245] entry_SYSCALL_64_after_hwframe+0x42/0xb7 00:16:19 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 565.109422] RIP: 0033:0x459829 [ 565.112605] RSP: 002b:00007fa7d30e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 565.120302] RAX: ffffffffffffffda RBX: 00007fa7d30e5c90 RCX: 0000000000459829 [ 565.127561] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 565.134817] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 565.142075] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d30e66d4 [ 565.149333] R13: 00000000004bfb92 R14: 00000000004d1818 R15: 0000000000000006 00:16:19 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:19 executing program 5 (fault-call:3 fault-nth:1): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:19 executing program 2: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:19 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:19 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 565.625304] FAULT_INJECTION: forcing a failure. [ 565.625304] name failslab, interval 1, probability 0, space 0, times 0 [ 565.727723] CPU: 0 PID: 20762 Comm: syz-executor.5 Not tainted 4.14.139 #35 [ 565.734829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 565.744172] Call Trace: [ 565.746760] dump_stack+0x138/0x19c [ 565.750398] should_fail.cold+0x10f/0x159 [ 565.754543] should_failslab+0xdb/0x130 [ 565.758506] kmem_cache_alloc+0x47/0x780 [ 565.762559] ? __phys_addr+0x78/0xe0 [ 565.766263] ? kasan_unpoison_shadow+0x35/0x50 [ 565.770835] __build_skb+0x35/0x2e0 [ 565.774454] build_skb+0x1f/0x160 [ 565.777898] bpf_prog_test_run_skb+0x157/0x9a0 [ 565.782474] ? __fget_light+0x172/0x1f0 [ 565.786439] ? bpf_test_init.isra.0+0xe0/0xe0 [ 565.790920] ? fput+0xd4/0x150 [ 565.794108] ? __bpf_prog_get+0x153/0x1a0 [ 565.798253] SyS_bpf+0x749/0x38f3 [ 565.801695] ? bpf_test_init.isra.0+0xe0/0xe0 [ 565.806645] ? bpf_prog_get+0x20/0x20 [ 565.810439] ? wait_for_completion+0x420/0x420 [ 565.815008] ? __sb_end_write+0xc1/0x100 [ 565.819061] ? fput+0xd4/0x150 [ 565.822245] ? SyS_write+0x15e/0x230 [ 565.825958] ? bpf_prog_get+0x20/0x20 [ 565.829758] do_syscall_64+0x1e8/0x640 [ 565.833638] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 565.838472] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 565.843649] RIP: 0033:0x459829 [ 565.846822] RSP: 002b:00007fa7d30e5c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 565.854522] RAX: ffffffffffffffda RBX: 00007fa7d30e5c90 RCX: 0000000000459829 [ 565.861781] RDX: 0000000000000028 RSI: 0000000020000780 RDI: 000000000000000a [ 565.869043] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 00:16:20 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) [ 565.876303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fa7d30e66d4 [ 565.883569] R13: 00000000004bfb92 R14: 00000000004d1818 R15: 0000000000000006 00:16:20 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:20 executing program 2 (fault-call:29 fault-nth:0): fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:20 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:20 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:20 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:20 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:20 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socketpair(0x10, 0x2, 0x0, &(0x7f0000000040)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:21 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 566.834464] FAULT_INJECTION: forcing a failure. [ 566.834464] name failslab, interval 1, probability 0, space 0, times 0 [ 566.951414] CPU: 0 PID: 20795 Comm: syz-executor.2 Not tainted 4.14.139 #35 [ 566.958530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 566.967870] Call Trace: [ 566.970471] dump_stack+0x138/0x19c [ 566.974091] should_fail.cold+0x10f/0x159 [ 566.978234] should_failslab+0xdb/0x130 [ 566.982200] kmem_cache_alloc+0x47/0x780 [ 566.986257] avc_alloc_node+0x27/0x4d0 [ 566.990139] ? trace_hardirqs_on_caller+0x400/0x590 [ 566.995149] avc_compute_av+0x185/0x570 [ 566.999118] avc_has_perm+0x345/0x4b0 [ 567.002918] ? avc_has_perm_noaudit+0x420/0x420 [ 567.007600] ? save_trace+0x290/0x290 [ 567.011400] ? save_trace+0x290/0x290 [ 567.015192] inode_has_perm.isra.0+0x154/0x1e0 [ 567.019784] file_has_perm+0x1f3/0x2c0 [ 567.023667] ? selinux_file_open+0x420/0x420 [ 567.028074] ? ___might_sleep+0x2ac/0x2b0 [ 567.032218] selinux_file_permission+0x325/0x480 [ 567.036970] security_file_permission+0x7d/0x1f0 [ 567.041732] rw_verify_area+0xe2/0x2b0 [ 567.045598] do_sendfile+0x364/0xbd0 [ 567.049300] ? do_compat_pwritev64+0x140/0x140 [ 567.053871] ? fput+0xd4/0x150 [ 567.057064] SyS_sendfile64+0x102/0x110 [ 567.061013] ? SyS_sendfile+0x130/0x130 [ 567.064988] ? do_syscall_64+0x53/0x640 [ 567.068959] ? SyS_sendfile+0x130/0x130 [ 567.072916] do_syscall_64+0x1e8/0x640 [ 567.076775] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 567.081596] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 567.086845] RIP: 0033:0x459829 [ 567.090011] RSP: 002b:00007fdb4e495c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 567.097706] RAX: ffffffffffffffda RBX: 00007fdb4e495c90 RCX: 0000000000459829 [ 567.104949] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 0000000000000007 [ 567.112190] RBP: 000000000075c070 R08: 0000000000000000 R09: 0000000000000000 [ 567.119432] R10: 00008000ffeffffe R11: 0000000000000246 R12: 00007fdb4e4966d4 [ 567.126676] R13: 00000000004c7005 R14: 00000000004dc630 R15: 000000000000000a 00:16:21 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:21 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:21 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)=0x3ae) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:21 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0xc, 0x22, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x284, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FMT(r1, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0xff, 0x0, 0x1010, 0x6, 0x0, 0x0, 0x2, 0x3}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:21 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:22 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000400)={0x0, 0xff7}, &(0x7f0000000440)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000480)={0x3f, 0x3a3, 0x8, 0x3, 0xfffffffffffffffe, 0xad0, 0x8, 0x7, r3}, &(0x7f00000004c0)=0x20) 00:16:22 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:22 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:22 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:22 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:23 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:23 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) [ 568.823658] kauditd_printk_skb: 346 callbacks suppressed [ 568.823666] audit: type=1400 audit(1566087383.188:19992): avc: denied { map } for pid=20849 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:23 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r3, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000ffeffffe) 00:16:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e24, 0x1, @mcast2}, 0x1c) [ 568.993092] audit: type=1400 audit(1566087383.228:19993): avc: denied { map } for pid=20849 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:23 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) [ 569.167995] audit: type=1400 audit(1566087383.238:19994): avc: denied { map } for pid=20849 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:23 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 569.366792] audit: type=1400 audit(1566087383.238:19995): avc: denied { map } for pid=20849 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:23 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x8c06, 0x0) setsockopt(r0, 0x80000000, 0x14000000, &(0x7f0000000280)="d5c5e6b6aece3d37c2c5ce22e317012e3db0871f43444210187cd1b8dfb5bf32afa979f7e503b722a6b546cc4a3b01ed4275d007ef1dd02a968d456c90e120edcc7e108b197fe0b73c9307025756e9cc37280be0baa8e77c926ade105616cfb91e7f30d3c3845d840d71280d8f823665397f7d8b2f7d04efbc22067ab00f112ccaa9eb15baf9f5462e52aa0eb29375c96bcd2e8cdf36f25640b7029ecae495746425d390c4b467768251", 0xaa) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:23 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 569.537274] audit: type=1400 audit(1566087383.238:19996): avc: denied { map } for pid=20849 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:24 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 569.698586] audit: type=1400 audit(1566087383.248:19997): avc: denied { map } for pid=20858 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:24 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 569.796344] audit: audit_backlog=65 > audit_backlog_limit=64 [ 569.814914] audit: audit_lost=532 audit_rate_limit=0 audit_backlog_limit=64 [ 569.855472] audit: backlog limit exceeded [ 569.862024] audit: type=1400 audit(1566087383.268:19998): avc: denied { map } for pid=20859 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:24 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:24 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:24 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:24 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:25 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x20) ioctl$DRM_IOCTL_GET_STATS(r2, 0x80f86406, &(0x7f00000007c0)=""/4096) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:25 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:25 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VIDIOC_SUBDEV_S_CROP(r0, 0xc038563c, &(0x7f0000000300)={0x0, 0x0, {0x4, 0x52e, 0x7e26, 0x3}}) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000480)=@req3={0x9, 0x2, 0x96, 0x2e3c, 0x0, 0x3, 0x2}, 0x1c) accept$packet(0xffffffffffffffff, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) write$selinux_create(r2, &(0x7f0000000640)=@access={'system_u:object_r:ping_exec_t:s0', 0x20, '/usr/lib/telepathy/mission-control-5', 0x20, 0x2e4c}, 0x5b) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xf, 0x6, &(0x7f0000000080)=@raw=[@generic={0x1, 0xd7, 0x14b, 0x3, 0x8}, @map={0x18, 0x9, 0x1, 0x0, r3}, @jmp={0x5, 0x9, 0x3ebf9cd1506dc7b4, 0xb, 0x3, 0x10}, @initr0={0x18, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x10000}], &(0x7f00000002c0)='syzkaller\x00', 0xd64, 0xe6, &(0x7f0000000380)=""/230, 0x41000, 0x5, [], r4, 0x13, r0, 0x8, &(0x7f0000000540)={0x8, 0x5}, 0x8, 0x10, &(0x7f0000000580)={0x0, 0x5, 0x1, 0x1}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:25 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:25 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:25 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:26 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x0, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) connect(r1, &(0x7f0000000280)=@caif=@util={0x25, "79f1f71a33d87be761b7a3e3353cdfa9"}, 0x80) 00:16:26 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:26 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x4e24, 0x0, @loopback, 0x5}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000300)=0xfffffda5) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(r2, 0x6, 0x10, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:26 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:26 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:26 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:26 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:27 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x426, 0x400) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x3}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000480)={r1, @in6={{0xa, 0x4e24, 0x401, @local, 0x80}}}, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) accept$unix(r2, &(0x7f0000000080), &(0x7f0000000100)=0x6e) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) write$binfmt_misc(r3, &(0x7f0000000380)={'syz0', "6825bb53a9385165821c3fa103468594b71a7bb75468c19ad1584cafcdd7de851804cc4dfaf595622c18b7374bcbc3e881d74acd45e1d55f5c9b3fa6d0c4f3cc92c7f8bfb84c789f946181d99046423d5580501b3b8e78043484301b903c3f8d35a487d76ad6cfc03a182e1dd5fd0b500880b328287aab4685612ea2da1c8cac0311fda65e349b4337ef975cc37412f2eff39801b252be24039745d3c7b945093bc251650eaec875ec84e85b177e8b2c9c6e200c4975152f7120cd1ddaf491e0854ddaf1709e7164a850bb65846ced3d210a67"}, 0xd7) dup2(r0, r2) 00:16:27 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:27 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:27 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x0, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:27 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x9, 0x0, &(0x7f00000006c0)="b9ff030000b42134cf", 0x0, 0x1}, 0x28) 00:16:27 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:27 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:27 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:27 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:27 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 573.835128] kauditd_printk_skb: 423 callbacks suppressed [ 573.835135] audit: type=1400 audit(1566087388.188:20356): avc: denied { map } for pid=21021 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:28 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x0, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 574.023574] audit: type=1400 audit(1566087388.198:20357): avc: denied { map } for pid=21021 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:28 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 574.094813] audit: type=1400 audit(1566087388.208:20358): avc: denied { map } for pid=21026 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 574.119109] audit: type=1400 audit(1566087388.248:20359): avc: denied { map } for pid=21026 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 574.149820] audit: type=1400 audit(1566087388.248:20360): avc: denied { map } for pid=21026 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:28 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYRES16], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x396, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x2}}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x18000000000002a0, 0xfffffffffffffca2, 0x5e, &(0x7f0000000040)="b9ff0300000d698cb89e40f02cea", 0x0, 0x2}, 0xfffffffffffffe9e) r2 = syz_open_dev$vbi(&(0x7f00000002c0)='/dev/vbi#\x00', 0x2, 0x2) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000380)={"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"}) [ 574.298606] audit: type=1400 audit(1566087388.278:20361): avc: denied { map } for pid=21028 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 574.443898] audit: type=1400 audit(1566087388.278:20362): avc: denied { map } for pid=21028 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:28 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 574.599487] audit: type=1400 audit(1566087388.288:20363): avc: denied { map } for pid=21026 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:29 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:29 executing program 5: r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x9, 0x101000) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0x2, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], &(0x7f0000000340)='syzkaller\x00', 0x3ff, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000280)={0x0, 0x4009}, 0x10}, 0x70) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) read(r2, &(0x7f0000000100)=""/207, 0xcf) 00:16:29 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) [ 574.717795] audit: audit_backlog=65 > audit_backlog_limit=64 [ 574.766528] audit: audit_lost=555 audit_rate_limit=0 audit_backlog_limit=64 00:16:29 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x6, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:29 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:29 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x0, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:29 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:29 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:29 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:29 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:30 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:30 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000002c0)={@empty, @rand_addr, 0x0}, &(0x7f0000000300)=0xc) r3 = syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0x2, 0x101) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x16, 0x8, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000001000000000001000000000c3630800040000003fbb040010000000818007000900fdff180000001a31000000000000090000009500000000000000"], &(0x7f0000000280)='GPL\x00', 0x269, 0x0, 0x0, 0x40f00, 0x1, [], r2, 0x13, r3, 0x8, &(0x7f00000003c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000400)={0x0, 0x3, 0x1000, 0x931}, 0x10}, 0x70) 00:16:30 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x0, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:30 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:30 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:30 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r3, &(0x7f0000000800)=""/4096, 0xffffffffffffff9b, 0x40002000, &(0x7f00000003c0)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0xfffffffffffffeb9) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:30 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:30 executing program 5: clock_gettime(0x7, &(0x7f0000000040)) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x8}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000180)=@assoc_value={r4, 0x7ff}, &(0x7f00000001c0)=0x8) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r5 = fcntl$getown(r1, 0x9) getpgid(r5) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:30 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:31 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:31 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:31 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x0, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:31 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:31 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x0, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:31 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:31 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:32 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:32 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x82, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x5) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:32 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:32 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:32 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:32 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000380)={{{@in=@multicast2, @in=@multicast1}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000040)=0xe8) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:32 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:33 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000280)=@sha1={0x1, "c82aa087e67ac6b2b037b76c9b7a1416c28284c7"}, 0x15, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:33 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) [ 578.849639] kauditd_printk_skb: 400 callbacks suppressed [ 578.849647] audit: type=1400 audit(1566087393.208:20763): avc: denied { map } for pid=21196 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 579.018702] audit: type=1400 audit(1566087393.338:20764): avc: denied { map } for pid=21208 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:33 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:33 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ppp\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0xffffffffffffffd8) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(r3, 0x6, 0x5, 0x0, 0xffffffffffffff6e) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4001fe) restart_syscall() ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) [ 579.192206] audit: type=1400 audit(1566087393.348:20765): avc: denied { map } for pid=21208 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:33 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 579.339981] audit: type=1400 audit(1566087393.368:20766): avc: denied { create } for pid=21180 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:33 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r1, r0) write$P9_RREAD(r3, &(0x7f0000000280)={0x68, 0x75, 0x1, {0x5d, "21759e50e4707c22f0dbac40a71dc4f3437cadab27d968b9b06789a5b28ccc3bb806bc01c7e5d18a3ae963cbb67acb403f92a3474f4b597b0be02d956dca4fd2b88124dd0f413e85e9b24dcf652de6d91320ef4557104ebe1552313a50"}}, 0x68) setsockopt$IP_VS_SO_SET_DEL(r3, 0x0, 0x484, &(0x7f0000000040)={0x1, @remote, 0x4e20, 0x2, 'lblcr\x00', 0x1, 0x401, 0x5c}, 0x2c) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:33 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 579.558337] audit: type=1400 audit(1566087393.368:20767): avc: denied { write } for pid=21180 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:34 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) [ 579.725546] audit: type=1400 audit(1566087393.378:20768): avc: denied { map } for pid=21208 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 579.819488] audit: audit_backlog=65 > audit_backlog_limit=64 [ 579.825364] audit: audit_backlog=65 > audit_backlog_limit=64 [ 579.829137] audit: audit_lost=556 audit_rate_limit=0 audit_backlog_limit=64 [ 579.848445] audit: backlog limit exceeded 00:16:34 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000280)={0x3ff, 0x81}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:34 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:34 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:34 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x0, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:35 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:35 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000004, 0x3f, 0xfffe) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(r3, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(r4, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r4, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:35 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:35 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:35 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:35 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x2000000004) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:35 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:35 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:36 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x0, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:36 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:16:36 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:36 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(r3, 0x2) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r3, 0x1000002007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:36 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:36 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:16:36 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:36 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x9, 0x80000) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x1b) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000280)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:37 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x0, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:37 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8f5ffff79a4f0ff00000000b70600000a10ffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe1800000085000058b300b70000000000000094ffffec000000000d7a28683a4102e4aeb54f36633e27c25e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b8ab5e6bdc4dc1af6d3c69553a4bddac602e0048bec11c874702f925b6dbd2af21b65fd389c7b45eb69aa2e884975fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:37 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:37 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:37 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x80, 0x0) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f00000001c0)={0x0, @reserved}) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, 0x0, &(0x7f0000000100)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r3, 0x0, 0x42, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000002c80)='/dev/dsp\x00', 0x4000, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x0) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x80000000, 0x111000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r4, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:37 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:16:38 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ppp\x00', 0x101280, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:38 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x0, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:38 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) [ 583.859147] kauditd_printk_skb: 383 callbacks suppressed [ 583.859155] audit: type=1400 audit(1566087398.218:21150): avc: denied { create } for pid=21358 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:38 executing program 1: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) [ 584.066883] audit: type=1400 audit(1566087398.228:21151): avc: denied { map } for pid=21360 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 584.218979] audit: type=1400 audit(1566087398.228:21152): avc: denied { map } for pid=21360 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 584.432440] audit: type=1400 audit(1566087398.248:21153): avc: denied { map } for pid=21360 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:38 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:38 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x20000000000000}, 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 584.537830] audit: type=1400 audit(1566087398.288:21154): avc: denied { map } for pid=21360 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:39 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x24001000, &(0x7f00000006c0), &(0x7f00000001c0), 0x0, 0x0) write(r1, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000280)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:39 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x0, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 584.761199] audit: type=1400 audit(1566087398.288:21155): avc: denied { write } for pid=21358 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 584.830752] audit: audit_backlog=65 > audit_backlog_limit=64 [ 584.866891] audit: audit_lost=558 audit_rate_limit=0 audit_backlog_limit=64 [ 584.869123] audit: type=1400 audit(1566087398.298:21156): avc: denied { map } for pid=21360 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 584.911375] audit: audit_backlog=65 > audit_backlog_limit=64 00:16:39 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) 00:16:39 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b7027c04dd17689efae20000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f642718b4089b7a6d612d171236633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc4f2e7c0e44fba803dc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000040)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000100)={&(0x7f00000000c0)=[0x3, 0x3, 0x4, 0x48da1530, 0x5, 0x80000001], 0x6, 0xfa53, 0x2, 0xaf, 0x2, 0x6, {0x7fff, 0x6, 0x1000, 0x6, 0x4, 0xffffffff, 0x4, 0xff, 0xd2, 0xb7, 0x5, 0x7ff, 0xfffffffffffffffe, 0x5, "b9e3aca7f4c4a3e69f6533b900b8dbbde416d642628b09f5176104586918699d"}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x2000, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000080)) splice(r3, &(0x7f0000000280), r2, &(0x7f0000000300), 0x9, 0x4) ioctl$DRM_IOCTL_GET_STATS(r4, 0x80f86406, &(0x7f0000000380)=""/219) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:39 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:39 executing program 2: syz_open_dev$sndseq(&(0x7f0000000140)='/dev/snd/seq\x00', 0x0, 0x8000) r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) fcntl$getown(r0, 0x9) socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:16:39 executing program 1: 00:16:39 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) 00:16:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:40 executing program 1: 00:16:40 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x0, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:40 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) 00:16:40 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:40 executing program 1: 00:16:40 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:40 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) 00:16:41 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000140)='./bus\x00', 0x0, 0x10118}, 0xfffffffffffffc46) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket$inet_udplite(0x2, 0x2, 0x88) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x10032, 0xffffffffffffffff, 0x0) 00:16:41 executing program 1: 00:16:41 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) openat$vnet(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) 00:16:41 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) 00:16:41 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x0, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:41 executing program 1: 00:16:41 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:41 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) 00:16:42 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:42 executing program 1: 00:16:42 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) 00:16:42 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0xc0001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0xffffffffffffff37) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000300)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='\x00', 0x141042, 0x5c) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:16:42 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:42 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x0, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:42 executing program 1: 00:16:42 executing program 0: 00:16:43 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000001880)='/dev/audio\x00', 0x40, 0x0) sendmsg$unix(r1, &(0x7f0000001a00)={&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f00000019c0)=[{&(0x7f0000001940)="59886de8c7a20a07d3d3a7c053bcde89c478856610d398630828783135d0caadeb1e84dde9c36b5e71b7", 0x2a}, {&(0x7f0000001980)="328abff004aaa6bdbfe95fa97d229cf71b20d3325e1fe0c75bbd", 0x1a}], 0x2, 0x0, 0x0, 0x4000000}, 0x20000004) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x40002, 0x0) r3 = getpgid(0xffffffffffffffff) process_vm_readv(r3, &(0x7f0000000700)=[{&(0x7f0000000380)=""/212, 0xd4}, {&(0x7f00000002c0)=""/112, 0x70}, {&(0x7f0000000480)=""/121, 0x79}, {&(0x7f0000000500)=""/120, 0x78}, {&(0x7f0000000580)=""/216, 0xd8}], 0x5, &(0x7f0000000680)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000080)=""/14, 0xe}], 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:43 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:43 executing program 1: 00:16:43 executing program 0: [ 588.867873] kauditd_printk_skb: 420 callbacks suppressed [ 588.867880] audit: type=1400 audit(1566087403.228:21529): avc: denied { map } for pid=21524 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 589.044166] audit: type=1400 audit(1566087403.248:21530): avc: denied { map } for pid=21524 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:43 executing program 0: [ 589.278460] audit: type=1400 audit(1566087403.248:21531): avc: denied { read } for pid=21517 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 589.425537] Unknown ioctl 21666 00:16:43 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x0, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 589.468318] audit: type=1400 audit(1566087403.278:21532): avc: denied { map } for pid=21524 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 589.516288] QAT: Invalid ioctl 00:16:43 executing program 1: [ 589.651506] audit: type=1400 audit(1566087403.308:21533): avc: denied { map } for pid=21524 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 589.798133] audit: type=1400 audit(1566087403.358:21534): avc: denied { map } for pid=21524 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 589.959770] audit: type=1400 audit(1566087403.408:21535): avc: denied { map } for pid=21529 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:44 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) 00:16:44 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x396, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:44 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x50ef61923115023b, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e23}, 0x1c) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) listen(r3, 0x10001) r5 = socket$inet6_sctp(0xa, 0x800000000000001, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000200)=[@in6={0xa, 0x0, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f0000000080)={{0x0, 0x0, 0x1, 0x2, 0x7}}) r6 = memfd_create(&(0x7f0000000880)='\xa6sj\xd9\xe2\xd7]#CKjts\a\xcf}\x06\xfcb\\b\x01\xb2\x90W\x8c\xf2P(\x93\x92\x88=\b\xa3\x14\x91\xa3-/\xff\x01m8b\xf1,\x1fZp\x9e\x9f\xcd\xb8\x83\xe1\xc3\xad9\xc8\xaa\xc5?\xe1BQ\xb5\x88\xb4d\x02\x9fM', 0x13) fcntl$addseals(r6, 0x409, 0x4) write$nbd(r2, &(0x7f0000000240)=ANY=[@ANYBLOB="67446698000000000300030002000000dc5e0836d12d84f1f69ff8d45293d06175170dbaa55aaaee8ada5d4f916b548df38525ff3f59d7f8d7cdec598fa6aec208cd8a4ed63d7c218a706c90330cce72397730e8a0fe11244121468e07082ab8994305cefff54ea23384dc898bb425cf5a64d73f3ada742f4019eb0146e19b2fe32eb92108ef6a6dbb37738894dede2df410138b8e953e04f50b880e0398871a1309ad4b93b494f7075155eb85d7c018caca76aa00"/190], 0xbe) ftruncate(r6, 0x6) ioctl$KVM_RUN(r1, 0xae80, 0x0) r7 = getpgid(0x0) ioprio_set$pid(0x3, r7, 0x0) mmap(&(0x7f0000015000/0x4000)=nil, 0x4000, 0x71e5537229a23927, 0x2010, r4, 0x0) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) 00:16:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") msgrcv(0x0, 0x0, 0x0, 0xa314f38140bec72c, 0x0) [ 590.031165] audit: audit_backlog=66 > audit_backlog_limit=64 [ 590.038903] audit: audit_backlog=66 > audit_backlog_limit=64 [ 590.055198] audit: audit_backlog=66 > audit_backlog_limit=64 00:16:44 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:44 executing program 1: r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f00001bf000/0x1000)=nil, 0x1000, 0x0, 0x6011, r0, 0x0) perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x40003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0x10000026f) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) 00:16:44 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:45 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f00000001c0)={0x0, 0x12}, &(0x7f0000044000)) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_nanosleep(0x8, 0x0, &(0x7f0000000040)={0x0, r1+30000000}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r2 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) tkill(r0, 0x13) 00:16:45 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="df5b6fb8f8fbef9eae49b9e08b7ec95398c7f1a87116e181e8ae84d6ea72602ede964c2c4c5f253bbb445272bbeed1421d477e50f2fe0cf093f9eec2069ebbb918ce449143eff484540c1399", 0x4c, 0xfffffffffffffffa) keyctl$setperm(0x5, r1, 0x2104) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:45 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:45 executing program 1: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) getpid() ioperm(0x0, 0x6, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_GET_NAME(0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x804}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'security.', 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4'}) socket$inet(0x10, 0x3, 0x0) 00:16:46 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:16:46 executing program 0: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) getpid() ioperm(0x0, 0x6, 0x0) socket$inet6_sctp(0xa, 0x1, 0x84) prctl$PR_GET_NAME(0x10, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000004540), 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000004c80)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES16, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="4617582351f28f1f1b949c977350f55519894e102f5f075c7f7005d4c45f4de32fbc1257b5ab2e72fdd37ef26b918eec98a58c8cc882b4b760e9bbdb619499aa40392dbb874e2ba3796c4561fd4e", @ANYRES32, @ANYBLOB="ba9fd6fa0ae6", @ANYRES32], 0x86, 0x804}], 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x200000000, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000001c0)='nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4', 0x0, &(0x7f0000000000)) removexattr(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)=@random={'security.', 'nfs\x00\xef\xf1a\x17\x12\x9e\xd0Y\x8a\xa8\xd4'}) socket$inet(0x10, 0x3, 0x0) 00:16:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) read(r0, &(0x7f0000000380)=""/219, 0xdb) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x447c95bef5d5bfc9, 0x0) name_to_handle_at(r2, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x3d, 0x6, "109cd9774395385c3a7c70505c3a9f4415041398dee745d3c631394ef19411d0f9f51687aa904e584ed2f663b5ce16f8e318d765cb"}, &(0x7f0000000300), 0x400) write$P9_RREMOVE(r2, &(0x7f0000000480)={0x7, 0x7b, 0x2}, 0x7) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:46 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:46 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x800000000000580, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)={0xa, 0x20000000004e20, 0x0, @ipv4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f00000000c0)=0x9, 0x4) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x2000) 00:16:46 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000140)={0x30001, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81]}) 00:16:46 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000040)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0xfffffffffffffe1f) 00:16:46 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x10, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:46 executing program 1: creat(&(0x7f0000000000)='./file0\x00', 0x0) socket$inet6(0xa, 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) clone(0x24001000, &(0x7f00000006c0), &(0x7f00000001c0), 0x0, 0x0) write(r0, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 00:16:47 executing program 0: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0xfffffffffffffd64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timerfd_create(0x5, 0x80000) r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000006c0)={{{@in, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6=@local}}, &(0x7f0000000280)=0xe8) prctl$PR_GET_SECUREBITS(0x1b) socket$inet(0x2, 0x80001, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x18}, 0xc, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYRES64=r0, @ANYRES16, @ANYBLOB="00022abd7000fcdbdffd3d3cb5910874ef0f6b5da808000100000000e70b0004000000000000"], 0x3}}, 0x400c0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/checkreqprot\x00', 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r3, 0x5411, 0x0) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000080)={0x750, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, {0x2, 0x40000000004e22, @remote}, {0x2, 0x4e20, @broadcast}, 0x0, 0x0, 0x2, 0x46a, 0x0, 0x0, 0x0, 0xffffffff7fffffff, 0xffffffffffffffff}) listen(r2, 0xfffff7fffffffffc) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000100), &(0x7f0000000180)=0xc) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000300)=0x3, 0x4) ioctl$TIOCGSID(r3, 0x5429, &(0x7f0000000480)) unshare(0x60000000) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x8010, 0xffffffffffffffff, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0xeae130a6b7383abd, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f00000004c0)={0x2, 0x0, @empty}, 0x10) shutdown(r4, 0x1) 00:16:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400201) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:47 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:47 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x1}, 0x347, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f00000004c0)='./bus\x00', 0x0, 0x10118}, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x20000018, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0)=0x3d0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f0000000300)='./bus\x00', 0x200, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x6) [ 593.135900] IPVS: ftp: loaded support on port[0] = 21 00:16:47 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:47 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 593.896442] kauditd_printk_skb: 368 callbacks suppressed [ 593.896448] audit: type=1400 audit(1566087408.258:21890): avc: denied { map } for pid=21674 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:48 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xc0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, &(0x7f0000000440)={0x4, 0x5}, 0x0, 0x0, &(0x7f0000000480)={0x0, 0xb, 0x401, 0x1}, &(0x7f00000004c0)=0x1, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=0x8001}}, 0x10) r2 = add_key(&(0x7f0000000380)='syzkaller\x00', &(0x7f00000003c0)={'syz', 0x3}, &(0x7f0000000400)="ccfcf95283898254b83f15f183c6dc18ea", 0x11, 0x0) get_mempolicy(&(0x7f0000000880), &(0x7f00000008c0), 0x53, &(0x7f0000ffe000/0x1000)=nil, 0x0) keyctl$reject(0x13, r1, 0x8, 0x7f, r2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200, 0x0) connect$vsock_stream(r3, &(0x7f0000000280)={0x28, 0x0, 0x2710}, 0x10) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0}, &(0x7f00000007c0)=0xfffffffffffffd9b) mount$9p_unix(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0\x00', &(0x7f0000000700)='9p\x00', 0x80, &(0x7f0000000800)={'trans=unix,', {[{@nodevmap='nodevmap'}, {@privport='privport'}, {@mmap='mmap'}], [{@hash='hash'}, {@fowner_eq={'fowner', 0x3d, r4}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}, {@permit_directio='permit_directio'}, {@obj_role={'obj_role', 0x3d, 'keyring\x00'}}, {@audit='audit'}]}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x802, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x1004e20}, 0x10) sendto$inet(r0, &(0x7f0000000140)="731247f8bf09abec01ced5d4dd6e92aa62aa7d935b7e32ca5c14d70409a996a1de1cf7f93a4586204c034bd8e4c941d69f646bd4ac01c42790d7f16f056a62fa20c0777a", 0x44, 0x8800, &(0x7f0000000000)={0x2, 0x4e1f, @local}, 0x10) connect$inet(r0, &(0x7f00000002c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) [ 594.150416] audit: type=1400 audit(1566087408.248:21889): avc: denied { create } for pid=21671 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:48 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:48 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 594.287717] audit: type=1400 audit(1566087408.298:21891): avc: denied { map } for pid=21673 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:48 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) [ 594.434340] audit: type=1400 audit(1566087408.308:21892): avc: denied { map } for pid=21673 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 594.552708] audit: type=1400 audit(1566087408.338:21894): avc: denied { map } for pid=21674 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:48 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f00000012c0)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000005900)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmsg(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1}, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) 00:16:49 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000240)='./cgroup/syz1\x00\xd8<\x89\x90\x06\xe8\x89\xdc\xe1\xe3}\xd3\xc7\x15\xaa9\xac\a\xc9\xe6\xabNT\x8dl#F\x94w\xc5\xf2x\xc2p\xba8\x94\xac&\x87\xf6\xaab\xe9U\x80c\x99\xb00N\x82>Z#\x97)CW\x15\xac\xb9\x9a\xb4\xff\xd8+\vU\x89`f-%\x87B\xe2{\x02o\x80\xe2\x87d\xff*\a\xff\x88\xc0\x1e\ndv\x14+\xc6\xb5\x14\xa5\xf6HK\x1f\xcf\x888\x9f J\xf4\fA\xc6i$\xf0\xd25\xe6\xf3\xc2\x1d\xbb[Z\xc4\x8c=\x99\x90\xd5Y\xd7\xd2L\au\xbfS%\x98\xad\x14!\xb7G\x15', 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000080), 0x114) 00:16:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000040)) [ 594.720542] audit: type=1400 audit(1566087408.338:21895): avc: denied { map } for pid=21674 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 594.896144] audit: type=1400 audit(1566087408.328:21893): avc: denied { write } for pid=21671 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:49 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) [ 594.950590] audit: audit_backlog=65 > audit_backlog_limit=64 [ 594.951482] audit: audit_backlog=65 > audit_backlog_limit=64 [ 594.997049] audit: audit_lost=581 audit_rate_limit=0 audit_backlog_limit=64 00:16:49 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$TIOCEXCL(r1, 0x540c) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0xfffffffffffffffa) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000100)="9833d03af44f0ccb5a1bf187545cab58491451f086e44c6b405f87ec963b406e08906cae8d23a562ffa2849142ad414e637880c9e2213362b7ca48df6f68edd082ebeb08a721d2f3c2026d321d681a998cd5964f7c7aed55e841048b50aac3596c188b800324a6f417963bc55f6da824c85f895b6287491dea37208c157b60385b3ffa31afeaec3c13a1ddf9800e949255961e6672cafe8f39ac7f1587b7c8859dce5604d4e340e1ad7c70b8831e8efa71a3508a52c122f6de223e4d0b5fc7c58a7d761cbe75b331b3085e800a4b13707ba859e7967d1699d756") r3 = add_key(&(0x7f0000000000)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="437d3cf3528e6d1498241fb2868c1413a009445e3f93b26f0efae5ab6a72bcdc3e7edd3e3b7ad45c0bd959f1316bee8f16cb4166c741c3b09bbaaad5df7e8cfacc59888221eb70e3979242e82939b0dc53efbeebcee6b5b400dbfeff239cd03a7162dfadb8d1298c99d378119f8d241211bdc7f274babde031add2b3735475f79f895f1bb02cebe623a8c3c1f7d10fe092d6b6d14e9966c9aa46034bdb052d0b46124c38fce9d552eb8ba29c648d749938e26e52e5ce608de978449019f298e44e3a9c1a9ad6b31d505aed217a3426cb8ff656c8535bffa31a08059891477abc4b8799fe214c6450d59fc66aa383f449bc", 0xf1, 0xfffffffffffffffb) request_key(&(0x7f0000000540)='asymmetric\x00', &(0x7f0000000580)={'syz', 0x3}, &(0x7f00000005c0)='{-GPLbdev\x00', r3) 00:16:49 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:49 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x40, 0x0) ioctl$SIOCAX25ADDFWD(r1, 0x89ea, &(0x7f0000000280)={@bcast, @default}) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cachefiles\x00', 0x40000, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000300)=0xffffffff, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KDSKBLED(r1, 0x4b65, 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:49 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:49 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0xfffffd1e, 0x0, 0x229}}], 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r2, &(0x7f00000017c0), 0x333, 0x0) 00:16:50 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:50 executing program 5: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000840)={'veth0\x00', 0x0}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000880)='/dev/sequencer\x00', 0xf6e494d7ff8c8c77, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x2000000000000086, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x20f, 0x0, 0x0, 0x0, [], r0, 0x7, r1, 0x8, &(0x7f0000000000)={0x1, 0x1}, 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x272) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:50 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) syz_init_net_socket$llc(0x1a, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) 00:16:50 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:50 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0xb2) ioctl$SNDRV_TIMER_IOCTL_STATUS(0xffffffffffffffff, 0x80605414, &(0x7f0000000100)=""/4096) r1 = syz_open_procfs(0x0, &(0x7f0000001300)='maps\x00') preadv(r1, &(0x7f00000017c0), 0x199, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(0xffffffffffffffff, 0x80045301, 0x0) 00:16:51 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0xfffffffffffffffc}, 0xfffffffffffffd9b, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = fcntl$getown(r1, 0x9) write$FUSE_LK(r3, &(0x7f0000000040)={0x28, 0xfffffffffffffff5, 0x5, {{0x8, 0x9, 0x0, r4}}}, 0x28) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x1ff}, 0x28) 00:16:51 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x79bc, 0x0) sendmsg$nl_route_sched(r1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_LOCK(r1, 0x40405514, &(0x7f0000000180)={0x7, 0x1, 0x401, 0x0, 'syz1\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000300)={'filter\x00', 0x7, 0x4, 0x628, 0x32c, 0x32c, 0x32c, 0x544, 0x544, 0x544, 0x4, &(0x7f0000000000), {[{{@arp={@local, @empty, 0xff000000, 0x0, @empty, {[0x0, 0x0, 0xff, 0xff, 0xff]}, @empty, {}, 0xfffffffffffff9c1, 0x2, 0x0, 0xffffffffffffff80, 0x0, 0x0, 'batadv0\x00', 'vcan0\x00', {}, {}, 0x0, 0x20}, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x4, 'system_u:object_r:dlm_control_device_t:s0\x00'}}}, {{@arp={@dev, @empty, 0x0, 0x0, @empty, {[0xff, 0x0, 0xff, 0xff, 0xff, 0x5acfb9a5613558c]}, @mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, {[0x0, 0xff, 0x0, 0x0, 0xff]}, 0x1, 0x8, 0x5, 0x7, 0x3ff, 0x0, 'ip6_vti0\x00', 'veth0_to_bridge\x00'}, 0xf0, 0x114}, @unspec=@CONNSECMARK={0x24, 'CONNSECMARK\x00', 0x0, {0x2}}}, {{@uncond, 0xf0, 0x218}, @unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x5, 'system_u:object_r:hald_acl_exec_t:s0\x00'}}}], {{[], 0xc0, 0xe4}, {0x24}}}}, 0x674) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0xb, 0x0, 0x0) 00:16:51 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:51 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:51 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hwrng\x00', 0x200, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000380)=[0x3112, 0x80000000]) r2 = perf_event_open$cgroup(&(0x7f0000000280)={0x2, 0x70, 0xedc, 0x20, 0xffff, 0x3, 0x0, 0x0, 0x7080, 0x8, 0x6, 0x1, 0x8, 0x80000001, 0x1000, 0x8, 0x0, 0x3ff, 0x3, 0xff, 0x10001, 0x800, 0x8, 0x7fff, 0x3fc5e557, 0xff, 0x34, 0x1, 0xc513, 0x0, 0x10001, 0x0, 0x3, 0x4, 0x5, 0x0, 0x5, 0x6, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x1, 0x10000, 0x7fffffff, 0x8, 0x2, 0xff, 0x7fffffff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x5f5cc7e3aa9480af) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x800000000005) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/93, 0x5d}], 0x1}, 0x0) r1 = dup(r0) r2 = dup(r1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0x893f, 0x0, 0x0, 0x800e00519) shutdown(r2, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001a00)=[{&(0x7f0000000080)=""/71, 0x47}, {0x0}], 0x2}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r5, 0x0, 0xccf3, 0x0, 0x0, 0x800e0050e) shutdown(r4, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvmsg(r6, &(0x7f0000002700)={0x0, 0x0, &(0x7f0000002640)=[{0x0}], 0x1}, 0x0) shutdown(r5, 0x0) shutdown(r3, 0x0) 00:16:52 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r3 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r3, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r3, 0x2007fff) sendfile(r2, r3, 0x0, 0x8000ffeffffe) 00:16:52 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:52 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x0, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:52 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x14, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:52 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) ioctl$sock_proto_private(r1, 0x89eb, &(0x7f0000000280)="d8f3833353beb599bb135457a440dbcf7c147197b86715cf862588b0f56656eb3804c9457ae9e0936d35e8767ef21b4498f37ea1b04a70b407288243cf8cb2dc2111bdf67dc260cdc818bebcf7ebb28dd07de8db0cd37a8f72bcfdd9755469d2130e1745a2059efe2f45ec867eeb4d7dfb3fd4e2fbfec42c97e98ddc5e7ce5b3f3e9fa65") 00:16:52 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000380)=""/140, 0x8c}, {0x0}], 0x2}, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0xfffffd00, 0x0, 0x0, 0x800e00519) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = dup2(r1, r2) fcntl$dupfd(r3, 0x0, r2) recvfrom$inet(r4, 0x0, 0xffffff51, 0x42, 0x0, 0x800e00511) shutdown(r2, 0x0) 00:16:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x32, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x4000}, 0x10}, 0x70) prctl$PR_GET_CHILD_SUBREAPER(0x25) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r2, 0x0, 0x488, &(0x7f0000000280)={{0x0, @multicast1, 0x4e23, 0x4, 'lblc\x00', 0x4, 0xffffffff, 0x52}, {@remote, 0x4e21, 0x2000, 0x3, 0x2, 0x1}}, 0x44) [ 598.926586] kauditd_printk_skb: 360 callbacks suppressed [ 598.926593] audit: type=1400 audit(1566087413.288:22250): avc: denied { map } for pid=21838 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:53 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) [ 599.077979] audit: type=1400 audit(1566087413.298:22251): avc: denied { map } for pid=21838 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 599.187568] audit: type=1400 audit(1566087413.298:22252): avc: denied { map } for pid=21838 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:53 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x0, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:53 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 599.419881] audit: type=1400 audit(1566087413.328:22253): avc: denied { read } for pid=21813 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000600)=[{&(0x7f00000000c0)=""/132, 0x84}, {0x0}, {0x0}], 0x1000000000000018) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x8164, 0x0, 0x0, 0x800e00547) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = dup(r1) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r3, 0x84, 0x20, 0x0, 0x0) recvfrom$inet(r2, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r1, 0x0) shutdown(r2, 0x0) 00:16:53 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r0) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:16:53 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:53 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) [ 599.623535] audit: type=1400 audit(1566087413.328:22254): avc: denied { map } for pid=21838 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 599.736840] audit: type=1400 audit(1566087413.338:22255): avc: denied { map } for pid=21833 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 599.932236] audit: type=1400 audit(1566087413.338:22256): avc: denied { map } for pid=21835 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:54 executing program 1: r0 = epoll_create1(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 00:16:54 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xfffffffffffffec4, 0x0, &(0x7f00000006c0)="b9ff01e9c49469ea", 0x0, 0x44a}, 0x28) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x20000) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x1) [ 600.128851] audit: audit_backlog=65 > audit_backlog_limit=64 [ 600.136909] audit: audit_backlog=65 > audit_backlog_limit=64 [ 600.147674] audit: audit_backlog=65 > audit_backlog_limit=64 00:16:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000680)=[{&(0x7f0000000000)=""/142, 0x8e}, {0x0}], 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x192fb1, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = dup(r1) getsockopt(r0, 0x0, 0x6, 0x0, &(0x7f0000000140)) recvfrom$inet(r2, 0x0, 0xba, 0x0, 0x0, 0x800e00545) shutdown(r1, 0x0) 00:16:54 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:54 executing program 1: r0 = epoll_create1(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 00:16:54 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x0, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x757, &(0x7f0000000380)="4e4784c75749cb8ba83a62938c6f665820aa58a4fb21586b820a9e4541ef250ee407cc688c14476095b5efd176cbbb79cceae5d1af17b2357d4d940162138a3104b134ffd95eeebab6e6654a99877a64b6f3ce858c4aeacabcdebe35a31d0c1bf21914dc45e89976fc6c1c3892e7278017cf61cb5113865a779113da6753c9714d2d0039e9514c24d13034daf46a4c31ff6a01053b8930b96b5c4cf2da3a8d9253a0a67d1040923ee1301b7d70ce086a6134d329586a7238c50b3676ef214610a48b29a6682e60de99c4b4093e3ae9248d6a1981b8f903f60d7fb647e84c740c60fcb2e2aa987ee6300fe6259e23b6628628bfaf706ca4df") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r3, 0x10e, 0x2, &(0x7f0000000280)=0x1f, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000680)=[{&(0x7f0000000000)=""/142, 0x8e}, {0x0}, {0x0}, {0x0}], 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x192fb1, 0x2, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = dup(r1) setsockopt$sock_int(r2, 0xffff, 0x4, &(0x7f00000000c0), 0x4) recvfrom$inet(r2, 0x0, 0xba, 0x2, 0x0, 0x800e00545) shutdown(r1, 0x0) 00:16:55 executing program 1: r0 = epoll_create1(0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 00:16:55 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x3a4) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x2000000a, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x800}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(r2, 0x100000000803) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x7ffffffffd, 0xc06d286400548d82, 0x1, 0x5, 0x8, 0x8}, &(0x7f0000000300)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:55 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:55 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000040)={0x0, @aes128, 0x3, "00dd06c514ad31ca"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:55 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000040)) 00:16:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) readv(r0, &(0x7f0000000680)=[{&(0x7f0000000000)=""/142, 0x8e}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x7) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r1, 0x0, 0x192fb1, 0x0, 0x0, 0x800e00549) shutdown(r0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0), 0x50}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) recvfrom$inet(r3, 0x0, 0xccf3, 0x0, 0x0, 0x800e0053d) shutdown(r2, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f00000001c0), 0x8) shutdown(r3, 0x0) shutdown(r1, 0x0) 00:16:56 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x0, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000040)) 00:16:56 executing program 5: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000300)={0x1, 0x8}, 0x8) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x5, 0x10, &(0x7f0000000000)={0x2}, 0x10}, 0xffffffffffffff08) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r3 = getpgrp(0x0) ptrace$getsig(0x4202, r3, 0x3, &(0x7f0000000280)) 00:16:56 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:56 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x340) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:56 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r0, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000040)) 00:16:56 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x2, 0x1) ioctl$DRM_IOCTL_GET_MAGIC(r0, 0x80046402, &(0x7f0000000280)=0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:57 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x0, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:57 executing program 0: 00:16:57 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:57 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:57 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x40, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x1}, 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000380)={{{@in6, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000480)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, @rand_addr="02541f8472aeec14ed74f9d980fd7b91", 0x2, 0x80000000, 0xfff, 0x500, 0x401, 0x40000, r3}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:16:57 executing program 0: 00:16:57 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/status\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x102) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x101000, 0x0) ioctl$IMCLEAR_L2(r2, 0x80044946, &(0x7f00000000c0)=0xc1000000) 00:16:58 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:58 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:58 executing program 0: 00:16:58 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:16:58 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x0, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 603.991551] kauditd_printk_skb: 357 callbacks suppressed [ 603.991560] audit: type=1400 audit(1566087418.358:22602): avc: denied { map } for pid=21992 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 604.020052] audit: type=1400 audit(1566087418.378:22603): avc: denied { map } for pid=21992 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 604.143899] audit: type=1400 audit(1566087418.378:22604): avc: denied { map } for pid=21992 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:58 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 00:16:58 executing program 0: [ 604.341337] audit: type=1400 audit(1566087418.378:22605): avc: denied { map } for pid=21992 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:58 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ff0000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093ce3315f72cdeaea962a4e12ac9801b982ab550eba48ba578f45b3442c745e7f36f07c4abb96b614d0139600e4d2acd9f635a0561c023bc30ce421cd5d87e75a5fa93a3bce125f509db8e6f631a19d4b8333f5f99532406f3dbf4e4e4a7e4dd23f2adeebcc92c6de0dbb8ff81e5a21028252adc022dd8"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x0, 0x70, 0x1, 0x6, 0x9, 0xdfd86de, 0x0, 0x2, 0x800, 0x8, 0x0, 0xffffffffa290170f, 0x9, 0x22, 0x0, 0x5, 0x400, 0x9, 0x5, 0x5, 0x7, 0x0, 0xd11, 0x4, 0x101, 0x4, 0x7f, 0x6, 0x0, 0xfb3, 0x7, 0x200, 0x7281, 0x3, 0x9, 0x9c, 0x8001, 0x4, 0x0, 0x4, 0x0, @perf_config_ext={0x7f, 0x5}, 0x4, 0xfffffffffffffff7, 0x8, 0x4, 0x4, 0x60, 0xfffffffffffffffe}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) r2 = msgget$private(0x0, 0x200) msgctl$IPC_STAT(r2, 0x2, &(0x7f00000000c0)=""/137) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) getsockname$packet(0xffffffffffffffff, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000680)=0x14) bpf$MAP_CREATE(0x0, &(0x7f0000000700)={0x1, 0x40, 0x488, 0x1000, 0xc1, r1, 0x3, [], r3, 0xffffffffffffffff, 0x2, 0x5}, 0x3c) [ 604.538075] audit: type=1400 audit(1566087418.458:22606): avc: denied { map } for pid=21995 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:59 executing program 0: 00:16:59 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) [ 604.782375] audit: type=1400 audit(1566087418.478:22607): avc: denied { map } for pid=21995 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 604.838618] audit: audit_backlog=65 > audit_backlog_limit=64 [ 604.885145] audit: audit_lost=589 audit_rate_limit=0 audit_backlog_limit=64 [ 604.921859] audit: backlog limit exceeded [ 604.936687] audit: type=1400 audit(1566087418.478:22608): avc: denied { map } for pid=21995 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:16:59 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:16:59 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x0, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:16:59 executing program 5: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/btrfs-control\x00', 0x8000, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa3000000000000070000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d640500000000006504040001000000030000000000006a0a00fe180000008500000017000000b74000000000000095000000000000000d7a28681f4102e4aeb54f36633e27c271341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac612e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae151993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba0930000"], &(0x7f0000000580)='syzkaller\x00', 0x4, 0x0, 0x0, 0xc3bcb069d31ee84e, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000000)={0x6}, 0x8, 0x10, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x40}, 0x10}, 0x70) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f0000000700)={0x4, 0x1e5b37b2, 0x6, {0x77359400}, 0x1, 0x8000}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f00000007c0)={{0x1, 0x0, 0x0, 0x1, 'syz1\x00', 0x1a8}, 0x1, [0x7, 0x8000, 0x1ff, 0x17, 0x4, 0x5, 0x4d, 0x4, 0x1, 0x2, 0x5, 0x6, 0x101, 0x3, 0x1, 0x0, 0x5, 0x4, 0x100, 0x3, 0xff, 0x8097, 0x8, 0x800, 0x1, 0xffffffff, 0x7fff, 0x4, 0x0, 0x100000001, 0xfffffffffffff8aa, 0x5268, 0xd855, 0x0, 0x3f, 0x10001, 0x7fff, 0x6, 0x3f, 0xff, 0x1, 0x8000, 0xfffffffffffffffe, 0x0, 0x5, 0x80000001, 0xffff, 0x11, 0x1, 0x48f, 0x9, 0x4, 0x2, 0xffffffffffffff87, 0x0, 0x3, 0x6, 0xffffffff, 0x8, 0x3, 0x8, 0x4254, 0x400, 0x6, 0x101, 0x26f4, 0x7, 0x963, 0x7fff, 0x1000, 0x3, 0xffffffffffffffd8, 0x401, 0x1800000, 0x3f, 0x100000000, 0x6a, 0x4, 0xfff, 0x8, 0x2, 0x5, 0x3, 0x9, 0x7d8, 0x80000001, 0x3ff, 0x9, 0x1, 0x100, 0xdc20, 0x4, 0x7, 0x0, 0x4, 0x3f, 0x1ff, 0x6, 0xb7c6, 0xfffffffffffffffb, 0x1, 0x9, 0x100000001, 0x1, 0x1, 0x5, 0x5, 0xfffffffffffffff7, 0x5, 0x1, 0x80000001, 0x2, 0x2, 0xff, 0xfa, 0x8, 0x10000000000000, 0x3, 0x0, 0xffffffff, 0x0, 0x0, 0x8, 0x9, 0x1, 0x101, 0x927e, 0x80000001], {r3, r4+10000000}}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000005c0)={0x0, 0x7fffffff}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000640)={r5, 0x8000, 0x7}, 0x8) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer\x00', 0x800, 0x0) ioctl$SNDRV_CTL_IOCTL_PVERSION(r6, 0x80045500, &(0x7f00000004c0)) r7 = socket$bt_cmtp(0x1f, 0x3, 0x5) r8 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) bind$tipc(r0, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x41, 0x0, 0x1}}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r8, &(0x7f0000000380)={0x15, 0x110, 0xfa00, {r9, 0x1, 0x0, 0x0, 0x0, @ib={0x1b, 0x4, 0x2, {"54fde276d331a3385486547751eb26bb"}, 0x5a6, 0xfffffffffffffffd, 0x4}, @ib={0x1b, 0x7, 0x80, {"dec7024d926c2e191d24b3d21c930a34"}, 0x5, 0x4, 0xfffffffffffffffa}}}, 0x118) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r7) 00:16:59 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) accept4$bt_l2cap(r3, &(0x7f0000000040), &(0x7f0000000300)=0xe, 0x80000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:16:59 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 00:16:59 executing program 0: 00:17:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:00 executing program 0: 00:17:00 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:00 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:00 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x0, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:00 executing program 0: 00:17:00 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:00 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r2, 0x84, 0x6e, &(0x7f0000000280)=[@in={0x2, 0x4e22, @rand_addr=0x97}, @in={0x2, 0x4e23, @empty}, @in6={0xa, 0x4e21, 0xfffffffffffffffb, @local, 0x9a81}, @in6={0xa, 0x4e20, 0xcf4, @mcast1, 0x1}, @in6={0xa, 0x4e20, 0x0, @empty, 0x6}, @in={0x2, 0x4e21, @rand_addr=0xfffffffffffffffd}, @in6={0xa, 0x4e22, 0x4, @empty, 0x9}], 0xa0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:01 executing program 0: 00:17:01 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r0, 0xffff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:01 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in6={{0xa, 0x4e22, 0xd4, @dev={0xfe, 0x80, [], 0x23}, 0x6}}, 0x1f, 0x8cf6}, &(0x7f0000000380)=0x90) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xa, &(0x7f00000003c0)={0x9, 0x4, 0xf, 0xd1b7, 0x89de, 0x7f, 0x24, 0x3, r4}, 0x20) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:01 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(0xffffffffffffffff, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:01 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:01 executing program 0: 00:17:01 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x15, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad430100000000009500000000000000050000000000000095000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:01 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x0, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:02 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:02 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040), 0x10) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) getpeername$unix(r0, &(0x7f00000005c0), &(0x7f0000000640)=0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = request_key(&(0x7f0000000080)='trusted\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='syzkaller\x00', 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000380)={r3, 0xbb, 0x9f}, &(0x7f00000003c0)=ANY=[@ANYBLOB='enc=raw hash=sha51Q-generic\x00'/77], &(0x7f0000000440)="ad174eede5b58ef64303569c10df13f1c6cf1aa37715b180076396524f4c76aeeb7b11a69ca136ce11061f12b96217dd5ec571539f8e200e35a274899b1a9bddf07020a1761f289af6a96d7f5bcf4df9c91b82bffebf20796017fcc92f59d22a20c9cd5c29b1aba930783f788f7da612e03e5f6d68e51b7bf4b63a4da7988085145aa2674f7caa0e178b3e432aaa021d1477734e1a58cadc14d1b856ee3352372e41d26ec376c0bd7279f7c9fb1c001b41932a22e77b7b55c5d0dc", &(0x7f0000000500)=""/159) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:02 executing program 0: 00:17:02 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:02 executing program 0: 00:17:03 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:03 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0xffffffffffffffb5) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e24, 0x0, @loopback, 0x8}, 0xffffff33) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) getpeername(r1, &(0x7f0000000280)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000040)=0x80) accept4$bt_l2cap(r2, &(0x7f0000000300), &(0x7f0000000380)=0xe, 0x800) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/dlm_plock\x00', 0x10d081, 0x0) r4 = fcntl$getown(r2, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000440)={{0x6, 0x0, 0x4, 0x20, 'syz1\x00', 0x1000}, 0x0, 0x8, 0x8, r4, 0x2, 0x1, 'syz0\x00', &(0x7f0000000400)=['syzkaller\x00', 'syzkaller\x00'], 0x14, [], [0x1ff, 0x0, 0x1, 0x80000001]}) 00:17:03 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x0, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:03 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x200000000000011, &(0x7f0000000280)=0x5, 0x4) 00:17:03 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) [ 609.004376] kauditd_printk_skb: 377 callbacks suppressed [ 609.004383] audit: type=1400 audit(1566087423.368:22962): avc: denied { map } for pid=22138 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 609.130500] audit: type=1400 audit(1566087423.368:22963): avc: denied { map } for pid=22134 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:03 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44b}, 0x28) 00:17:03 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:03 executing program 0: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000001780)='/selinux/load\x00', 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") write$selinux_load(r0, &(0x7f0000000040)={0xf97cff8c, 0x8, '\nE Linux'}, 0x10) [ 609.340058] audit: type=1400 audit(1566087423.368:22964): avc: denied { map } for pid=22136 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 609.490084] audit: type=1400 audit(1566087423.368:22965): avc: denied { map } for pid=22136 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:03 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 609.647292] audit: type=1400 audit(1566087423.368:22966): avc: denied { map } for pid=22134 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:04 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-aesni\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ab553fec94248c32e27d04000000288a", 0x10) r1 = accept$alg(r0, 0x0, 0x0) sendmsg$alg(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=[@assoc={0x18, 0x117, 0x4, 0x200}], 0x18}, 0x0) write$binfmt_script(r1, &(0x7f00000000c0)=ANY=[], 0x271) recvmmsg(r1, &(0x7f0000004ec0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000000)=""/84, 0x54}, {&(0x7f0000000780)=""/98, 0x62}, {&(0x7f0000000280)=""/112, 0x70}, {&(0x7f0000000340)=""/249, 0xf9}], 0x4}}], 0x1, 0x0, 0x0) 00:17:04 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:04 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x0, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 609.907633] audit: type=1400 audit(1566087423.368:22967): avc: denied { map } for pid=22136 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 610.129689] audit: type=1400 audit(1566087423.368:22968): avc: denied { map } for pid=22134 comm="modprobe" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 610.191825] audit: audit_backlog=65 > audit_backlog_limit=64 [ 610.253809] audit: audit_lost=598 audit_rate_limit=0 audit_backlog_limit=64 [ 610.320377] audit: audit_backlog=65 > audit_backlog_limit=64 00:17:04 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_mount_image$minix(&(0x7f0000000040)='minix\x00', &(0x7f0000000280)='./file0\x00', 0x8, 0x2, &(0x7f0000000440)=[{&(0x7f00000002c0)="1f1df60cbc24ed788ccdcc4ab9c769fd0e78b306c94bd2d6d3432cc7d999485e5e3944b8b82bb0c1ae57cf84cc25b2046c813ca9076addd10cf926e25577b0ea90c19693c1b022bccdbd233caaa85b0a45a078a1951a2858033edd672953bcc758a105eb686c14761ea5f2a19ea34cdd1052a971fe", 0x75, 0x10000}, {&(0x7f0000000380)="a04342edd82d51fd6912943324284e8349e87907eaa46b2057892daa1b3698ffe92488d36c7b002bfda928435e6891842789c7e0cae7b1f4c3064f187391aa0b663dcdc2edd83a60de3340a4e1180036eb43f6e7a895ed0c8961800ab6d776f193eba04c21902f17c36022c59066b7e47172ff292a0e0f6dd655c4bd6bb7987df71d", 0x82, 0x7fffffff}], 0x80000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:04 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000003c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:17:04 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000280)={0x9, 0x1}) 00:17:05 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:05 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:05 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_VAPIC_ADDR(r2, 0x4008ae93, &(0x7f0000000000)=0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62160554]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000780)={"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"}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$mixer(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$TIOCGWINSZ(r3, 0x5413, &(0x7f0000000080)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 00:17:05 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x0, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:05 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:05 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) lstat(0x0, 0x0) lstat(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x365, 0xbcc4, 0x9, 0x3, 0x4}, &(0x7f0000000600)=0x98) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 00:17:05 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getgid() bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:06 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:06 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x7fff, 0x3f, 0x80010003) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000140)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r0, r0, 0x0, 0x8000f7effffb) 00:17:06 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:06 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xf4X#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r0, &(0x7f0000000b00)='mem\x00\x01y7SwaS.\x06ur\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\xfb\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xedV\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) lstat(0x0, 0x0) lstat(&(0x7f0000000800)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000840)={0x0, @in={{0x2, 0x4e24, @broadcast}}, 0x365, 0xbcc4, 0x9, 0x3, 0x4}, &(0x7f0000000600)=0x98) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) write$P9_RXATTRWALK(r1, &(0x7f0000000080)={0xf}, 0x20000357) mremap(&(0x7f0000433000/0x1000)=nil, 0x1000, 0x1000, 0x3, &(0x7f000007f000/0x1000)=nil) madvise(&(0x7f00000d9000/0x600000)=nil, 0x600000, 0x8) 00:17:06 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a02cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:06 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:07 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[@ANYRES64], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x10000) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000380)={0xf8, r3, 0x200, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000000}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x129f216967d4df7a}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffff000}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x26}]}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x8, 0x1a}}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x39}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x10}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10000}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}]}]}, 0xf8}, 0x1, 0x0, 0x0, 0x20000000}, 0x24040040) 00:17:07 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x0, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:07 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:07 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:07 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27f2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$adsp(&(0x7f0000000380)='/dev/adsp#\x00', 0x4, 0x6a23340cdbf41485) readlinkat(r1, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/49, 0x31) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x800, 0x0) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000480)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={&(0x7f00000004c0)={0xe4, r4, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1f}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="1adcbf2887ced5fda7be7b8211fe2d1a"}]}, @IPVS_CMD_ATTR_DEST={0x4c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x5}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x5b2d3322a9b402c0}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x228d}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@loopback}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x2f}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2c}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PROTOCOL={0x8}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x800}, 0x400c4) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000300)={0x0, r3, 0x4, 0x2}, 0x14) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000000280), &(0x7f00000002c0)=0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:07 executing program 2: inotify_init() pipe2$9p(&(0x7f0000000480), 0x80800) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/enforce\x00', 0x0, 0x0) r1 = accept4$netrom(0xffffffffffffffff, &(0x7f00000003c0)={{0x3, @null}, [@remote, @rose, @remote, @remote, @default, @netrom, @rose, @bcast]}, &(0x7f0000000440)=0x48, 0x800) fcntl$getown(r1, 0x9) socket$key(0xf, 0x3, 0x2) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r2) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e1e, 0xe, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0xfffffffffffffd53) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0x1, 0x3, 0x107, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r0, 0x8004745a, 0x0) ftruncate(r0, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:17:07 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000040)) 00:17:08 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x0, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 614.011201] kauditd_printk_skb: 388 callbacks suppressed [ 614.011208] audit: type=1400 audit(1566087428.378:23342): avc: denied { map } for pid=22283 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:08 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x0, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:08 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000040)) 00:17:08 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:08 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) syz_read_part_table(0x7, 0x2, &(0x7f0000000300)=[{&(0x7f0000000040)="eaa618df1f3da3f44c1a48dcac2d78b865a092224135d9c5e69b10c3b51a9f755cd96df863a9789be42fabccc46625893a5ecaa9cad84309c9", 0x39, 0x7}, {&(0x7f0000000280)="54bbfcf8c4d9d4852a1a700ab769f2ffca35e39fd48abf4909bcca3598fa1272d76ea093ffd19cc4f96128bfd249406457e21baf5684c00ed6e4cd411775bd31b1c6cb118eb0c8cf119e40b6ad076d53", 0x50, 0x80000000}]) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000380)='/dev/null\x00', 0x101080, 0x0) ioctl$TCGETS2(r2, 0x802c542a, &(0x7f00000003c0)) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0x7d, 0x1e4, &(0x7f0000000400)="b9ff0300000d698cb89e40f02ceac45f1eb3ca6051c93146dbb7534885c8c13031e4e47cd96c4071930303b7488f8569b7ec968d7e13532ceecd24eea21d65e3ce3c2fc30d6199d67a4dd07a2f018a3c6960c2b19a62f25820e163fbaf4a10f771be184ad9814bfbf6bbe91c9a1db1f7fb7ea61f2cddda75f9a0543336", 0x0, 0x44a}, 0x28) [ 614.176268] audit: type=1400 audit(1566087428.378:23343): avc: denied { map } for pid=22283 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 614.318450] audit: type=1400 audit(1566087428.378:23344): avc: denied { map } for pid=22283 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 614.492652] audit: type=1400 audit(1566087428.378:23345): avc: denied { map } for pid=22283 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 614.677517] audit: type=1400 audit(1566087428.408:23346): avc: denied { map } for pid=22281 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:09 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r2, &(0x7f0000000040)) [ 614.909301] audit: type=1400 audit(1566087428.408:23347): avc: denied { map } for pid=22280 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:09 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x0, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 615.079884] audit: audit_backlog=65 > audit_backlog_limit=64 [ 615.083660] audit: audit_backlog=65 > audit_backlog_limit=64 [ 615.119113] audit: audit_backlog=65 > audit_backlog_limit=64 00:17:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffef2d6405000000000065040400010000000404001000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc65b9a34e6bdc4dc1a0100000000000000c602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba09300000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqn(r1, 0x0, 0x5e00836aa4326767, &(0x7f0000000400)={@initdev, @local}, &(0x7f0000000440)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r3 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000001c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000280)={r3, 0x1000, 0x5f}, 0x0, &(0x7f00000007c0)="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", &(0x7f00000002c0)=""/95) vmsplice(r1, &(0x7f0000000540)=[{&(0x7f0000000480)="8c52a05161c12e58283fc83ac608a01d3221f7a7bf47c7c1b887d31a636a51b84bb41b1e0869270d13e1d59c336a5204760a034bd455de179d3818db9f51434cca3f678d7b1937db66158df193ca01d537612baed1495a308c66fc388e6c9501814f31646670c620645d56f74b2530b0420ce2899be56407ff115eb36ae8c6e8742cbf48debd63808dc5c5517efa97", 0x8f}], 0x1, 0x8) keyctl$get_keyring_id(0x0, r3, 0xf9e9) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000380)='/dev/cachefiles\x00', 0x200000, 0x0) ioctl$MON_IOCG_STATS(r4, 0x80089203, &(0x7f00000003c0)) [ 615.138328] audit: audit_lost=604 audit_rate_limit=0 audit_backlog_limit=64 00:17:09 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000140)=0x100, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:09 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x0, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:09 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 00:17:10 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:10 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:10 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 00:17:10 executing program 5: recvmmsg(0xffffffffffffffff, &(0x7f0000004ec0)=[{{&(0x7f0000001ac0)=@rc, 0x80, &(0x7f0000001dc0)=[{&(0x7f0000001b40)=""/125, 0x7d}, {&(0x7f0000001bc0)=""/61, 0x3d}, {&(0x7f0000001c00)=""/189, 0xbd}, {&(0x7f0000001cc0)=""/220, 0xdc}], 0x4, &(0x7f0000001e00)=""/140, 0x8c}, 0xfffffffffffff8df}, {{&(0x7f0000001ec0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, 0x80, &(0x7f0000003240)=[{&(0x7f0000001f40)=""/239, 0xef}, {&(0x7f0000002040)=""/160, 0xa0}, {&(0x7f0000002100)=""/4096, 0x1000}, {&(0x7f0000003100)=""/253, 0xfd}, {&(0x7f0000003200)=""/11, 0xb}], 0x5, &(0x7f00000032c0)=""/131, 0x83}, 0x1}, {{&(0x7f0000003380)=@alg, 0x80, &(0x7f0000004700)=[{&(0x7f0000003400)=""/169, 0xa9}, {&(0x7f00000034c0)=""/22, 0x16}, {&(0x7f0000003500)=""/97, 0x61}, {&(0x7f0000003580)=""/4096, 0x1000}, {&(0x7f0000004580)=""/111, 0x6f}, {&(0x7f0000004600)=""/104, 0x68}, {&(0x7f0000004680)=""/90, 0x5a}], 0x7, &(0x7f0000004780)=""/100, 0x64}}, {{&(0x7f0000004800)=@isdn, 0x80, &(0x7f0000004900)=[{&(0x7f0000004880)=""/71, 0x47}], 0x1, &(0x7f0000004940)=""/61, 0x3d}, 0x7}, {{&(0x7f0000004980)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, 0x80, &(0x7f0000004d80)=[{&(0x7f0000004a00)=""/237, 0xed}, {&(0x7f0000004b00)=""/23, 0x17}, {&(0x7f0000004b40)}, {&(0x7f0000004b80)=""/172, 0xac}, {&(0x7f0000004c40)=""/56, 0x38}, {&(0x7f0000004c80)=""/91, 0x5b}, {&(0x7f0000004d00)=""/98, 0x62}], 0x7, &(0x7f0000004e00)=""/156, 0x9c}, 0x9}], 0x5, 0x10000, &(0x7f0000005000)={0x77359400}) r1 = syz_open_dev$cec(&(0x7f00000050c0)='/dev/cec#\x00', 0x2, 0x2) ioctl$RTC_UIE_ON(r1, 0x7003) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x20, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000005100)='syzkaller\x00\x91\x97\x16\x17E\x18:zC\xbc]\xfe\x13\x00\xb7\xd8C\xd7\xab\xce\xfd\x1f\t\x02\x91>q0\xf6Z#V\x86b\x92\x05\x96\x85\x87^\x85\xbfyA\xc2\xd4\x99\xe2[\xeed-\xf8\x7f\x9a\x1c\x10\xee\xf9\x87S\x93MI\x9c\\\xd8\xc3\xbeMJ\x83q}\xd7\x18\xee\t|>\xd5\xaf\rW\xba\xf2)E\x82\x1b\n;\xc2\xbaz7\xb3\x02\x98\xac\xa7W\xb2\xfff\xa10\x8c%\x8a\ax>%\xa5\xac\x9f\xd0\x86\xd2\x9b\x8f\xd8\xdc\xc1\xbd\x8e\xe1!S\xba2`\xa9\xc7\xd1\x0f\xc5wB0xffffffffffffffff}) arch_prctl$ARCH_SET_GS(0x1001, 0x5) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fc) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r2, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:10 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x0, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:10 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 00:17:11 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x0, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:11 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:11 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1bfffffffffffffd, 0x40, 0x6) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x20000, 0x0) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000300)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r3, r5, 0x0, 0x8000ffeffffe) 00:17:11 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, 0x0) 00:17:11 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:12 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:12 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:12 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, 0x0) 00:17:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$vbi(&(0x7f0000001040)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) fstat(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000480)={0x0, 0x0}, &(0x7f00000004c0)=0xc) r7 = getegid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@mcast2, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000000600)=0xe8) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000000700)=0xe8) syz_mount_image$hfsplus(&(0x7f0000001080)='hfsplus\x00', &(0x7f00000010c0)='./file0\x00', 0x3, 0x3, &(0x7f00000013c0)=[{&(0x7f0000001100)="ea00aed7f4034b34b82a4e366539c497d2a07a399f5c7b5f10ae5bf9e1ec57d1c1e09dc44a4b04e53c39c8bbffc36c8e5d9d6463b76a7b7178ec7c588f0513c6ec7bc5d4939856c0d9ff1d98f5c02739656a54e8415e3c2fb7c9ec72c9ce45c5bc563b88e179c793dbf40a636de7f2961196748474d40b4022bcdc14832cbf5f7813a710fa926494b2b4fc4d5c6b44716810c13c2f7b7f21e0cdc64c7e785abd51bd3e0409d8173a6901bddd40c38fc334d2f229b8184e4e7f51fa8304efa7a7b80d631183ec03c1169a2294f0cf4085fb9c771fbadb572651", 0xd9, 0x200}, {&(0x7f0000001200)="c4ff8d91fe38ae1346d57e9ce4e84f4c8907a9f8cb4b8228d52121178530a16014598a2456be6335c1b9526dac29254f5e7ea5ecc73d7dab6aaf5e7f593c647bd1ce0330dbb4f2c300a32a3a6722c773f15364fa29a734c8cedc00b15b5cbe85414382d536c2188e87078c281adf93a80ebc940a1b95000a83a63b0a878024202405", 0x82, 0x7}, {&(0x7f00000012c0)="ae50211e1edf235dbeefe1eab26b051e600d294ae782c8e9bcb8654fd32c16a888169f76455eff32a60c4a0d8274ef2b0852fb37ce5bd3b4b4eea955f5bba35c82b2095c73fe16a72de12bcf22ae7caef9359cc897d98951a1b43f5f726461e561d54593591e543e197b07eb8144c35b10077fe522c0eec0dddf80d3aa0e334cf92ebb3d56c5e06d42ff3ce8113203fc1d476e6ce28e1455eb8e5f87bfe62d1fb02cffdb84a1185582d91d82c6c0248666f94bdcd81a05ec1a94dc87bbaacdbdb85068d8a3afbaeddd07a0b7d5b9cc59b4300d9ae876b3841fb33434fec1", 0xde, 0xffffffffffffffff}], 0x4014, &(0x7f0000001440)={[{@umask={'umask', 0x3d, 0xffffffff00000001}}, {@uid={'uid', 0x3d, r9}}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@permit_directio='permit_directio'}, {@func={'func', 0x3d, 'MMAP_CHECK'}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r4}}]}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000740)={0x0, 0x0, 0x0}, &(0x7f00000008c0)=0xc) getresuid(&(0x7f0000000900), &(0x7f0000000940), &(0x7f0000000980)=0x0) getresgid(&(0x7f00000009c0)=0x0, &(0x7f0000000a00), &(0x7f0000000a40)) lstat(&(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x6, &(0x7f0000000b40)=[0xee01, 0xee00, 0x0, 0x0, 0xee00, 0x0]) r17 = getuid() getgroups(0x9, &(0x7f0000000b80)=[0x0, 0xee01, 0xee01, 0xee01, 0xee01, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xee01]) write$FUSE_DIRENTPLUS(r3, &(0x7f0000000bc0)={0x470, 0x0, 0x1, [{{0x1, 0x0, 0x85, 0x4, 0xc9, 0x5, {0x1, 0x53f, 0x67, 0x0, 0x7, 0x6, 0x7f, 0x10000000, 0x7f, 0x5, 0xfff, r4, r5, 0xb31, 0x1}}, {0x0, 0x4, 0x0, 0x401}}, {{0x3, 0x1, 0xaa, 0x80000000, 0x80000000, 0x0, {0x4, 0x501b, 0x100000001, 0xffffffff, 0x3f, 0x4, 0xfffffffffffffffe, 0x1d, 0xfffffffffffffffb, 0x4, 0x6, r6, r7, 0x7}}, {0x2, 0x3, 0x1, 0x10000, ':'}}, {{0x4, 0x3, 0xfffffffffffffff8, 0x8, 0x7, 0x40, {0x3, 0xaa5d, 0x6, 0x80000000, 0x5, 0x1d7, 0x6, 0x9, 0x5, 0x7, 0x0, r8, r10, 0x80, 0x2}}, {0x5, 0x6, 0x0, 0x6}}, {{0x0, 0x3, 0x7, 0x1, 0xf3, 0x8, {0x4, 0xfffffffffffffff8, 0xc4, 0x9, 0x5, 0xf80f, 0x8d6c, 0x1, 0x9d, 0x101, 0x6, r11, r12, 0x0, 0x5}}, {0x4, 0x59a55cc1, 0xa, 0x6, 'syzkaller\x00'}}, {{0x5, 0x3, 0x5d5cacb2, 0x800, 0x1, 0x6, {0x1, 0x9, 0x81, 0x7, 0x8, 0xc21f, 0xfffffffffffffff8, 0x40, 0x1f, 0x80, 0x0, r13, r14, 0x8, 0x10000}}, {0x2, 0x6, 0x8, 0x6, 'vboxnet0'}}, {{0x6, 0x1, 0x9, 0x100000000, 0x7f, 0x9, {0x2, 0x3f, 0xfff, 0x20, 0x2, 0x6, 0x8, 0x100000001, 0x1, 0x1, 0x10000, r15, r16, 0x8, 0x1}}, {0x6, 0x5, 0xa, 0x0, 'syzkaller\x00'}}, {{0x5, 0x2, 0x6, 0x6, 0x4, 0xc000000000, {0x1, 0xff, 0xb71, 0x2, 0x4, 0x4, 0x5, 0x7fffffff, 0x0, 0x9, 0x8b, r17, r18, 0x2, 0x8}}, {0x2, 0x1000, 0x8, 0x3, 'vboxnet1'}}]}, 0x470) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) signalfd4(r2, &(0x7f0000000040)={0x7fa}, 0x8, 0x800) 00:17:12 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x0, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:12 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, 0x0) 00:17:12 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}}, 0x2ec) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 618.388834] hfsplus: umask requires a value [ 618.419169] hfsplus: unable to parse mount options 00:17:12 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) syz_genetlink_get_family_id$tipc2(0x0) 00:17:12 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000380)={0x0, 0x5}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000400)={r2, 0x58, "5fa1b377d580ca7188788e1303e4771b17775112f0e03de0d732a1b4813d0e03ddae0710e1b1249fd4a79392042ad86fdddf9861e2b977363ad0d7749224a7f5eb03d98f91ea5c3f00dfae2674b97a6e05d865e8ffa1d750"}, &(0x7f0000000480)=0x60) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0xc59d) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') r3 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000500)={'syz', 0x3}, &(0x7f00000007c0)="fb03c9b953f0d04ca1349afaefba10c2ce7fd6772dc62aae775df6f05747b0fb60a80af90cd0df68d05af90cf10537c32b51f959bd5cb4ae4e53c8c5d79e5766466e16ae3c28f98e69925b2ab0351aed462b0fb5a2170ac62cc693ac98d7c98c0704db020b9f6d7284b962108d614963b3b21a4c22e7371899ae555d57d35732d3cefc77a5bb31c6a3ea3a26cec1e916daa96f0b2a0623f24d634f1269f5438669332dc5e7d01da5e05a5f235cbdf2c0f71c5c91c534700427c996120ddb8b18187c56a48e93b6b9b757170b68e51de945bdf785fd8aea498d9f3f67e3454727a69d45ce57651d23a7ad89c5a9d5fc398055f52e2c405954027742c78a3ce34f0841ddebbfc2cf75feac12db776d011cfb95eb3f6dd70f8481d6325cd475654bbe6c2f5c672ccc96f49876ca77395321e562acea3b8cd39f480f2eb95b32ef17c2ccab1af91720161c07a3150d9a5ef20d384e142a24cf038130b9485f71523e67fed2949cceb930fb048e5355070f57b76e689c26df65acd58fa0e4a2158212dde95052fcdfdc4a4272bb14056df9a82aa2e7c7b14443d96f629451dfadddcb3e0c839d5939cd99b2cee57e53df5ed11c0d3e9b8c4d09ca857cf895646d756e0ce86a8e13f024c863c97d0de88da6fca1900b6aa8730bd2d02ea829fb4923fdc0775fac073b98ee273ba64f48956ae6fc4e30d7d2813e8c008746eba8624d3273502d6ac050e74f3f0651d15974992250e8ef035f793d3e7bd711fbdb18445232f27f203f29052703018c58f3ce1c270bebaa40f6b0b7f759fa1dc55fb66ecd3ff8890029fbb2c42666ccaee459d25851ffd2800c677515533fb2b762f98859f6d7f2a104fb7171371c2aa8026f3321be3e76005ac67c308ef1f4e59b05026fffc167746c06473607ce9c91eadad8ad63d6420dafb18d2b9d0b3792b25dd33f16405023efabd2ad6bca8d4486fa9b24f64ec125b563fff960457a7d551d6c66d5f8104a3af9bf8d83e78d85f6add0282126358d754a09be77b826d4e140c07acb9e08b025d939aebc0a5576eae55ffda72f828ab32a2de651764e0f458b1bd31a2a1418a8f0271ee760aba2a89b22444ecfe1f39e31550f18d5195eade48db19fa78d7e971632f49592e279e1f8018a0f29777caa297292c64368709e3bf6c3c450b902a613d45ea5e3bfc69b5cf0ef223427b540824fb43b682e56ebc7a9db992eeb9243dbdd74c2661a2a24641584efe2176079147ff2476978ff1e67baf28dee9add2d275d71c805bb6b1fef27e8d1acaca20040a590453688f7c3d9f19b790ef13c25d0c7aa324021452d114fe07865557b47beae53dd2412ecb6d9380223c9e25ef46e94fafdee99d084657423d43e94372a9fa5951d23cc2f9a78c0ad117179316c52944c3132cd2c41dae8eb1cb265b9f469b2a811515c3524c8b09e0a2acddcc380c4dfb437f5a2eea35c38e159c5a065b1baac9bdff60f101d092f2cb95ef5e3c3fab8d895e301eb53e12e42aa1135f1a3e803223ebcdec304f6c2016ed67eb8431899ce6c92b0050822f211f5288c83e4a0d5e5ebce6728e98e63404f9ee80628d28fbb8d3a88cb85eaf9c489324b0b8019584bd362f64368b647766e0256897e3b83f3d4c26ccd3a8fc6de382e918ee41fb76be5ca1b228ebc66e15bacd59db204ccf712e46c519632439b4c8ffda39be61be9e5f7843eb56a46b86a065a76b830e67008cd155beafaf74199c93d25709e22ecf2d435d587d474e53cb2013d72d5ad64bab5b70a72252484547f29e2fa7d315769c47f89151aff2c6dd55465c7171e739e95e32fbfeca7edcb50823fc27924252fb44bbf5a0a3230f1a3ff99253f3e942964ecbde1462a556146d43fed827171ff6ac541accdaccd4a5a370f2a52a50e78b5a6c423029df284f889a9e52969101c7bd83c21db3c1c260dd07cab028735918e77034b2ddc3321423d195b37ea65d4ebe76c593789a05107ca623e74afeb2e4d43ef45f2c671edeaac80fc1101c65b4460a7c4fd5316983ad4a56243c49a2bac6677127ddf9b0810ec58ed6740352569d034fa71cc7186ded2d8800fa88204101ce8533a5a28cfcb806ef5ab7850e808ec7d16dd88e5dc77f66482e26727a85df325fd70a62091deb342e3021be3ecb17891fc0e9f337691a4faaaa5b07279aef190d9f6926481e91d13141af543868b4cbc68c20f70cf2a44f1d4bd7713bfff39b0347ede70c528cd9e3fba5d616159ff657e8f589bcf93b327d439b3a33e2baba02a97ea5e32044fa1c2d263f66aadd96e74c20cc8c060bc096dc5dea005be6a7c995abc95e1c6738236589e672ba09e950c7b5a95921726011313108048d6d73b4e887934b287f86d4a4197eda70d1048e608f435486ca3f09896df6e590c4a68c9b70f483e24beb9453828b06993d54f0675bd2f39f016152a7c23ce6fad35551ff43655a4d1ea52f2d95b7ce4fb53859f9bb0c82b2654feaa789e4c1354d5260cdcbbc0146d05db84394e4cf2c37f82e2635101cc667c6647b0f92dc859020fc33fa9ecc273343fe1c68e966afdeca7fb20aefd6bdc5fd643fa8afe119be636b75f03a93a0c4fb590f7a969e7f4d5c185a8631a23c7663f74ec1e17171863728ba213ad1af876ada406911c68beb5c1ba29c35834866916b8e146028c4ddc995b1bafd81843a07e8392eb0d55507ec586cb8aae38e06098c275ecc7cb185e7fdb36d1bcdc6757138384850fea0e188308fb55c48fea9723bff04f0fa24dd1334a83fa782ed115881902a6fcea31496b4405d335560fa169bccd6dba3ee096207de2a9df727709714c14e1f8b9571a8e8ca895875d6e3328c6a1c48ac928ea9978650d9eb3d7a75010ab3ffa9173fc9a245ff353fae912681e48d47af9593b92ffc1ff5911b9bf69ce88e51f96988dfd818fb12fca954bb54f8a4893a686e540e255487ec8eb4b5581bb4b7306fd18fd133f44df203171d198f71f51c7db19d2312bc8f4f9d70a4a428fd00ac990a95f802bd58a3ebff3205255790aca5a4e8eb74c8d4541529a7d31ae24cc8dd80a445c6b8c7e025c34743cfba5aa0d8e00b243653c50d7067f9f521fd64d20cb7edc0e34d2a04f8f8e2b4d3627c33a96ae421bf35987c8de8c59f622e6b9bc7cbc46f5564cbad9eadb834ef8a3abbb54ade2c5009ab5fcca91d7c15a34995adc75a29cd7783cf798781c855c942ace9092691605dd470e56db7e6a5d8e6b97d970d0a16c9b550a56c840e6f0199807dbdcc55134a83278b9a257a047f93d0dcea94108bdf0394928cee9e5f15654cdcbeeadf2b7e55501b5e73e8eab062d8ef90b84dc921d73a51ceaf5ce20085ec8dc2425d9cf00594d250cf60be6441215475dfb36822d955b763d51fa3cbd9964cc9f6c9e291798fd73ffd4e7e1ebe307b7014aaf6549f922a028dd78bcac3567730ec1a36014c68b5112c46ce5658c9fe24f865aa68060183d46f38c7137ed66843d097e22e1ed99c63d3332de538f81f057696bdf4b8e0e31f5453b3c24720798161862a42e64fd79695e153a05f8fc391a34ae50afd3965c62534cae2100b2b85c51d96d9355a34eacfca10a6c7f38e6149b646bc96c32a5799b6eb96d31b9680dba549be5ca2720dfe1428ded03c9504720ca256aff4119235e240e01371ea4ef2624b19d62b0539a1bfec7e910abe75a7a55873f42c335deaedf5335cf56799283eae930d14b4c6cfaa00d1a9ad2c4764985cc22fa435f8e2a3fe0603d6b50d95dbd35db3f4e1ae00cdadf5b5332f2ca20fc5059e22e49284e5e3074916aedf7e49ff7e411e46df6aa99c42fb23380702201e84034f7fd23aabc8b372c68b8b580b1229b7a37228888835d7c017d0fe3bd3554ac20ac8ce68f89abe91de9d07f0eb5f9258ce0a8af27f35f08b14b11dd7283ee2330c132eea55abbe41387fdeb5d99eba186d915fbb57323fc42cb30946a86ac0de3e53279fa32c8cea715e729308ebef3924bbeff6fbe557329ae75ae0310a156beb402a32dd9e538a85877330d2165da66c9d2f1e5b959a85b1494478bfd9ded94fb296f207893f1b8a03d50708033ce4d989fb4480c6ebecda9c64a33f0863f3a27138c53eabaa52276ae89c87d2efe9bb4e5b72e71381d6e0c1492e11aad6e25671d04c6fe3133281f209fbcd8e1a55b971687b7fa645d038b7672d476bd6b892ece62c4caa222f88f57a64af101428d5a03f42e91009d4c74c5b4ec02deb8f6f0757482c440f6e0ce1d7b82e74ceda993ac61ce71748ff1d5eb1a2e74fff3472d098627e39f95702559d281d297b4af82d4f75a8abf4883f5d68346041a4bbac420098826ab1162c6083a138d689aa7a92266acd9855850976c50950fda4c01c441033aace3c77ac2c48e10a83f0654381e61b967dfde35e272abe15ed03870c22b253e93db595a1470e621f891f391e2a725102be412299fb5d8b4dc4a9f01f3123b2301799f7735b7819fcfd550665a06f5cfe0d7be6f72bdce54ede82d40b4d744dc3d726f3c12fb3bb793b80f1f780238038de841df10799af5431723699175c4660a2f34b47c1efa5cbda78eb6d59bc903d2e43cf5bc05a02b1714fc85ede82e330ff23e099d4d227122de1e0611d0814f62209428d2983e77d2412f1bf3bcfabffee506f9decdcfba255811d7b423b320ec1352c8f1967cd46912cbacada57eb3e6c2ebb03cab5735699f9483dd4ca88ce5a2ac8f71aac66f673988473390b2ef57c2a34221167b068e34672da97368f69ab495128b9f3711ffcc70c78726c3bb744cf26533ced045cd00561285bee19962901e248aa9db6ccd0675d8c45ca258d9f98b2811c8e56772cfdcebbff381f97874a34eede4ba924026940568fe34cfb4198017e6a6cbf0bac74ef612a5bcfe35e5ce83d15a863955814c0a48e722b0967ea0e11c61ea1b281265bc0945bed1d5c9fcde7bc751eae3fde1b5ca62eeb4be7706b2a446cd1e5916afb06ba4179f6b2c604a1e302f3d1f9103852316967f809649b34871541659789cc6317a74f5245ce8916f50a1467791e13fa616e87dc20f0be12097e16dd5aca026b0a1d40fb4830e5f75f1985a14219685f852cf6dcddb827aaded2dadbb55e31cf3945e2363e6b3792e3b44ef06817b9436309b4b962f25ba6c5e2009a9b47bf29c7e814e7abcd0e83cb614d45f18ba1a328f46074473f2e42dc5bd68d568ad1efa2a087bde324a2295625df442bfd0a12cc32e2ddc40ee65127bf563d1467bcc23cab79caf934f638992882ac0f337112238e34fd98f3fe3f4b77b7fca48132fb26df84d94a9a83f97f515c666c71359ce4468bf4a74413296fc6621c033633cbcc031cf8c7ce77970729bbb0686566387b0815412db69734659e8c2f52fb07b875c192368c175592de367982e7ce12d3cf5e17f24591065af69ad5fed0648b7da6f1aba62ff04c8e7c0c2f881d2318d0eded4e301f38cabad9763ba383228a7557aa1318e61045513eb65ffeeeb70d7d9ee545c0969df9246fef56a47175930b8e950875fe9f81651e9328a1c756029981a326710666d0c9494ec7e74f49b9867db1c2caaf103648ff33425a25dafe1afac19603e81746b391068ec29a9ec7a1494bac8e271537a05498df52f410e02f2e7862ce8a2f882315ad7552b1605bdd003d145e0f7b4ca8dcf2449854021d78c55c6d24720d1b9077c5d889542b2d34c4f3ee134edc22e17518ea7485438cc3bf08fe6e80c93cd203c635582557d690843aeb739e15f3acdcd923d44423a", 0x1000, 0xfffffffffffffff8) keyctl$read(0xb, r3, &(0x7f0000000540)=""/162, 0xa2) fchmod(r0, 0x30) r4 = socket(0xa, 0x0, 0x9) accept4$x25(r4, &(0x7f0000000280), &(0x7f00000002c0)=0x12, 0x80800) 00:17:13 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:13 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = dup(r1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) syz_open_dev$amidi(0x0, 0x0, 0x0) ioctl$EVIOCGSW(0xffffffffffffffff, 0x8040451b, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket(0x10, 0x803, 0x0) sendto(r3, &(0x7f00000000c0)="120000001200e7ef007b0000f4afd7030a7c", 0x12, 0x0, 0x0, 0x0) recvmmsg(r3, &(0x7f00000020c0), 0x320, 0x0, &(0x7f0000003700)={0x77359400}) syz_init_net_socket$llc(0x1a, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x2) [ 619.037791] kauditd_printk_skb: 341 callbacks suppressed [ 619.037798] audit: type=1400 audit(1566087433.398:23681): avc: denied { map } for pid=22415 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 619.175268] audit: type=1400 audit(1566087433.438:23682): avc: denied { map } for pid=22415 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 619.399181] audit: type=1400 audit(1566087433.458:23683): avc: denied { map } for pid=22415 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:13 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x0, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:13 executing program 2: creat(&(0x7f0000000140)='./bus\x00', 0x8) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000003c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000300)=""/19, 0x13}, {&(0x7f0000001800)=""/4096, 0x1000}, {&(0x7f0000000440)=""/109, 0x6d}, {&(0x7f00000004c0)=""/66, 0x42}, {&(0x7f0000000540)=""/82, 0x52}, {&(0x7f00000005c0)=""/100, 0x64}, {&(0x7f0000000640)=""/45, 0x2d}], 0x7, &(0x7f0000000700)=""/17, 0x11}, 0x20) fcntl$getown(r0, 0x9) socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:17:14 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) syz_genetlink_get_family_id$tipc2(0x0) [ 619.666362] audit: type=1400 audit(1566087433.458:23684): avc: denied { map } for pid=22418 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 619.737212] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.748866] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.769626] audit: audit_lost=608 audit_rate_limit=0 audit_backlog_limit=64 [ 619.778270] audit: audit_backlog=65 > audit_backlog_limit=64 [ 619.784207] audit: audit_lost=609 audit_rate_limit=0 audit_backlog_limit=64 [ 619.798156] audit: audit_lost=610 audit_rate_limit=0 audit_backlog_limit=64 00:17:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000580)={'vcan0\x00', 0x0}) r2 = openat$null(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/null\x00', 0x0, 0x0) accept4$unix(r2, &(0x7f0000003a40), &(0x7f0000003ac0)=0x6e, 0x800) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000003940)={0x0, 0x81}, &(0x7f0000003980)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000039c0)={r3, 0x1}, &(0x7f0000003a00)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x17, 0x7, &(0x7f0000000040)=@raw=[@initr0={0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x9}, @call={0x85, 0x0, 0x0, 0x2a}, @ldst={0x2, 0x53b6e60f0e2f0873, 0x0, 0x4, 0x5, 0xfffffffffffffff4, 0x14}, @call={0x85, 0x0, 0x0, 0x69}, @alu={0x4eba4cb1ee1c490d, 0x4eb, 0x5, 0x8, 0xd0afb6475e63154f, 0x30, 0x4}, @exit], &(0x7f0000000280)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x5, [], r1, 0x16, r2, 0x8, &(0x7f0000000600)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x0, 0xc, 0xffffffffffffa91d, 0x8000}, 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) recvmmsg(r2, &(0x7f00000036c0)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/136, 0x88}, {&(0x7f00000002c0)=""/20, 0x14}, {&(0x7f0000000300)=""/12, 0xc}, {&(0x7f0000000440)=""/75, 0x4b}], 0x5, &(0x7f0000000540)=""/25, 0x19}, 0xfff}, {{&(0x7f00000017c0)=@x25, 0x80, &(0x7f0000001a80)=[{&(0x7f0000001840)=""/122, 0x7a}, {&(0x7f0000000680)=""/4, 0x4}, {&(0x7f00000018c0)=""/202, 0xca}, {&(0x7f00000019c0)=""/184, 0xb8}], 0x4}, 0x3c}, {{&(0x7f0000001ac0)=@x25, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001b40)=""/238, 0xee}], 0x1, &(0x7f0000001c80)=""/8, 0x8}, 0x8000}, {{&(0x7f0000001cc0)=@vsock={0x28, 0x0, 0x0, @reserved}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001d40)=""/90, 0x5a}, {&(0x7f0000001dc0)=""/155, 0x9b}, {&(0x7f0000001e80)=""/217, 0xd9}], 0x3, &(0x7f0000001fc0)=""/219, 0xdb}, 0x3}, {{&(0x7f00000020c0)=@alg, 0x80, &(0x7f0000002380)=[{&(0x7f0000002140)=""/230, 0xe6}, {&(0x7f0000002240)=""/199, 0xc7}, {&(0x7f0000002340)=""/14, 0xe}], 0x3, &(0x7f00000023c0)=""/74, 0x4a}, 0x1}, {{&(0x7f0000002440)=@un=@abs, 0x80, &(0x7f0000002940)=[{&(0x7f00000024c0)=""/202, 0xca}, {&(0x7f00000025c0)=""/231, 0xe7}, {&(0x7f00000026c0)=""/65, 0x41}, {&(0x7f0000002740)=""/232, 0xe8}, {&(0x7f0000002840)=""/199, 0xc7}], 0x5, &(0x7f00000029c0)=""/251, 0xfb}, 0x1}, {{&(0x7f0000002ac0)=@can, 0x80, &(0x7f0000002fc0)=[{&(0x7f0000002b40)=""/10, 0xa}, {&(0x7f0000002b80)=""/197, 0xc5}, {&(0x7f0000002c80)=""/70, 0x46}, {&(0x7f0000002d00)=""/197, 0xc5}, {&(0x7f0000002e00)=""/37, 0x25}, {&(0x7f0000002e40)=""/43, 0x2b}, {&(0x7f0000002e80)=""/152, 0x98}, {&(0x7f0000002f40)=""/67, 0x43}], 0x8}, 0x1f}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f0000003040)=""/13, 0xd}, {&(0x7f0000003080)=""/245, 0xf5}, {&(0x7f0000003180)=""/121, 0x79}, {&(0x7f0000003200)=""/119, 0x77}, {&(0x7f0000003280)=""/155, 0x9b}, {&(0x7f0000003340)=""/225, 0xe1}, {&(0x7f0000003440)=""/80, 0x50}], 0x7}, 0x7f}, {{&(0x7f0000003540)=@in={0x2, 0x0, @multicast1}, 0x80, &(0x7f0000003600)=[{&(0x7f00000035c0)=""/28, 0x1c}], 0x1, &(0x7f0000003640)=""/114, 0x72}}], 0x9, 0x2100, &(0x7f0000003900)={0x0, 0x1c9c380}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x10001) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:14 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:14 executing program 1: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x1}, 0x347, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000480)={&(0x7f00000004c0)='./bus\x00', 0x0, 0x10118}, 0x10) sendto$inet6(r2, 0x0, 0x0, 0x20000018, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @ipv4={[], [], @loopback}}, 0x1c) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f00000000c0)=0x3d0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f0000000300)='./bus\x00', 0x200, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x6) 00:17:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) pipe(&(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000280)={0x3c, 0x401, 0x1, 0x70, 0xffff}, 0x14) 00:17:15 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) syz_genetlink_get_family_id$tipc2(0x0) 00:17:15 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)}, 0x0) 00:17:15 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x80000, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)=0xffffffffffffff58) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x0, 0xc06d286400548d85, 0x2, 0x4, 0x8, 0x7}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x122) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(r4, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0xa8) 00:17:15 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:15 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFNETMASK(r1, 0x891c, &(0x7f0000000380)={'syzkaller0\x00', {0x2, 0x4e22, @loopback}}) r2 = accept4$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000280)={0x0, 0x3ff, 0x9, 0xfffffffffffffff8}, &(0x7f00000002c0)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000300)={0xce2, 0x0, 0x2fc98970d949ce5b, 0x2, 0x6, 0x4, 0xa967, 0x65, r3}, 0x20) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:16 executing program 1: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x6, 0x0, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:16 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x0, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:16 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:16 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0x0, &(0x7f00000000c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0xfffffffffffffffd}, 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:17 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:17 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r0 = creat(&(0x7f0000000040)='./file0\x00', 0xba4839b90c9e7fee) setsockopt(r0, 0x47, 0x4, &(0x7f00000000c0)="2b39cda7ed9df4883a7ed95c78e057dffcb3c158bc3a961569b07a7407a370159e7cd8dd17ce22e5630ca8294594438fa516e75fecd79e2ea09e68502e4800fcdb659c266bf019962e1c29bc47cb6b906edfa28979e7cfb28dd47c24e26e7c15ec238d2ff66f167f29510f367ef23c216addb6e23bddd9ef4f75f00b3f891c743c30a2b22531df572b6074acf337339d5666f40b42e50790d5bd269454867381638462bd41e3bf7886157e6387e293da", 0xb0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) listen(r0, 0xbe) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 00:17:17 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093eab0d3c9773068fd4b19f3f0d7cade9a76c22254099c6905eab4b401edc6dd3fe817480eb41b7e8dd6aa4a64d1506443511dcf0a9ad19fcce2d20fd421c24895beb9c432966cb5a1f3746a836821d05c5cce19e2ebc1b0b5304f039309d2f3413da8358527a78da219a50f5fc89d5e6de02edb1b81e0"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:17 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x0, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:17 executing program 3 (fault-call:3 fault-nth:0): clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:17 executing program 5: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x7ff, 0x400000) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000280)={0x3fa1, 0x3f, 0x6, 0x8, 0x1, 0x100000001, 0xac, 0x88, 0x9, 0x6}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:18 executing program 1 (fault-call:4 fault-nth:0): r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:18 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c0000e900006113500000000000bf2000000000000007000000080000003d03010000000000950000000000000069260000004fddb4d5e3432ccb5984f110dc000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000002507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095fe30dacc000000052000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:18 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 624.046578] kauditd_printk_skb: 411 callbacks suppressed [ 624.046591] audit: type=1400 audit(1566087438.408:24090): avc: denied { map } for pid=22547 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:18 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000280)={0x2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 624.245371] audit: type=1400 audit(1566087438.418:24091): avc: denied { map } for pid=22547 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 624.333791] FAULT_INJECTION: forcing a failure. [ 624.333791] name failslab, interval 1, probability 0, space 0, times 0 [ 624.391246] audit: type=1400 audit(1566087438.418:24092): avc: denied { map } for pid=22547 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:18 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 624.475504] CPU: 1 PID: 22554 Comm: syz-executor.1 Not tainted 4.14.139 #35 [ 624.482624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 624.491965] Call Trace: [ 624.494558] dump_stack+0x138/0x19c [ 624.498222] should_fail.cold+0x10f/0x159 [ 624.502371] should_failslab+0xdb/0x130 [ 624.506338] kmem_cache_alloc+0x2d7/0x780 [ 624.510492] SyS_epoll_ctl+0x7e1/0x2a00 [ 624.514462] ? __mutex_unlock_slowpath+0x71/0x800 [ 624.519301] ? SyS_epoll_create+0x170/0x170 [ 624.523614] ? SyS_write+0x15e/0x230 [ 624.527341] ? do_syscall_64+0x53/0x640 [ 624.531303] ? SyS_epoll_create+0x170/0x170 [ 624.535614] do_syscall_64+0x1e8/0x640 [ 624.539490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 624.544326] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 624.549504] RIP: 0033:0x459829 [ 624.552680] RSP: 002b:00007eff0278dc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000e9 [ 624.560374] RAX: ffffffffffffffda RBX: 00007eff0278dc90 RCX: 0000000000459829 [ 624.567630] RDX: 0000000000000005 RSI: 0000000000000001 RDI: 0000000000000003 00:17:18 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x100000001, 0x7, 0x4}, {0x0, 0x1f, 0x1, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 624.574887] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 624.582171] R10: 0000000020000040 R11: 0000000000000246 R12: 00007eff0278e6d4 [ 624.589426] R13: 00000000004bfec1 R14: 00000000004d1de8 R15: 0000000000000006 00:17:19 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x280000, 0x80) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x5, 0x800000000, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113560000000000000000000000000007000000080000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000de0000150400000400f9ffad43010000000000950000000000001042aebe58f0586b30427f331100050000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r2 = fcntl$getown(r1, 0x9) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@initdev, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000001940)={&(0x7f0000001900)=[0x0, 0x3, 0x49f26c21, 0xdd27, 0x1], 0x5, 0x6fd, 0x10001, 0x2b, 0x8f818d9, 0x80000000, {0x8001, 0x9, 0x10000, 0x3ff, 0x1, 0xc2, 0x400, 0x5, 0x2, 0x3269, 0x8000, 0x5, 0x3634, 0x6, "5c876d95d16d358c6edeebd4f31b01cb6d6299cbc0131194b0f8710f66e4cfc4"}}) ioctl$CAPI_GET_MANUFACTURER(r0, 0xc0044306, &(0x7f00000019c0)=0x8) sendmsg$nl_generic(r0, &(0x7f00000018c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000200)={&(0x7f0000001a80)={0x12cc, 0x1a, 0x100, 0x80070bd29, 0x25dfdbfe, {0x1b}, [@nested={0x230, 0x8d, [@generic="2e0a8606798621afbd3e4a0d8c7b3e4e1c276755024c0b9f4d4d8da606d0a86830201e35ca648512c0da93e154000f9719cf03fbb8d2302bc09937b99d48a0b6999ab9a29bd62e77fd0f81bd85e7d2bd86b5db2bdb105bd33f14ae370ea0c9974764ea97ab4645dbfe7ae9bd5833e0e679385ef52b", @generic="fb67cbfdbcdf2336a1f6f27e82c86c3e17f6f018be776b6c43a1e238a924f283f8d2948932474bdc1aee67ca03ca43fc3a719318440c4f53cf8ea335bf0ff7fba585ea2c1445e0a95d9d68997ba289cc7f7721247867d64c50a06e3ed6c6344204425fc30ed50c308ffcb388add2540446307243833893e0eec426d566431647a58b4c9189e51f0077a90ac1b71a865a85116de1d7e38f55600408b1d4b8fa3b0ee75647c61bbd0579f8a65755e7f3123b7d5ed054c52998c19c5060b4fe756f0d3ef6c91050666757ef57e3a2d9745981a01191", @typed={0x8, 0x1, @pid=r2}, @generic="b2b74708ab5799e46fcc882b2edb635fb0afb59d04b2ab4d8e807481867fd98cb4acee145f984e5d99df3fa6652074c96a7f5b6712a5557a347fdd7b93efb358a02ae8abf46e6fef208c2e75446e7eeea10b3c", @typed={0x88, 0x2c, @binary="7a8564f518c44974c38f8423f175288c994ecb282e234b6e4b437c782d38a489b182de70a46c2612e2810b44c433452e815ab6dbdcc615bb54194ecc353e068201203b594f7b7522349a71d9a868679e39a189f93a50475e48c03099a0b5b9b1b57a1bb6496df254606ee16a60bbcecb76a158866e315f0531c2c3cd2f67316b8a"}]}, @typed={0x8, 0x9, @str='GPL\x00'}, @nested={0x1080, 0x35, [@typed={0x8, 0x3a, @fd=r0}, @generic="3b3a3aee4ebbc692769db19ab2dd795f29b488335e5ce9d20f53d81b9af64d9c0a16b6db82610ebfa26cdcab1495bd7f40fa1a655c82fe9de4c4f4ac5a93c269d8f50066686af4051e86e251659c37aac29b92d67df2c5045b8159d4c81b13743b335a412261406db366a1d143844697daa89c4a", @generic="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"]}]}, 0x12cc}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) exit(0xffffffffffffffff) ioctl$VIDIOC_TRY_DECODER_CMD(r0, 0xc0485661, &(0x7f0000000140)={0x7, 0x2, @raw_data=[0x7, 0x7, 0x4, 0xfa1f, 0x72, 0x4, 0x4, 0x1, 0x934, 0xff, 0x7, 0x8, 0x36c, 0x377dca75, 0xc6]}) syz_genetlink_get_family_id$tipc2(0x0) getpeername$netlink(r0, &(0x7f0000001a00), &(0x7f0000001a40)=0xc) [ 624.633137] audit: type=1400 audit(1566087438.418:24093): avc: denied { map } for pid=22547 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/net/pfkey\x00', 0x40000, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000300)=[@text16={0x10, &(0x7f00000002c0)="0faeaf4fc3baf80c66b8dc5d3e8a66efbafc0c66ed660f1c33260fc7bd0300b812008ec83e0f30f20f5cec0f080f4a380f0013", 0x33}], 0x1, 0x8, &(0x7f0000000380)=[@cstype3={0x5, 0x4}, @cr0={0x0, 0x40010010}], 0x2) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 624.737676] audit: type=1400 audit(1566087438.418:24094): avc: denied { map } for pid=22547 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 624.789060] audit: type=1400 audit(1566087438.488:24095): avc: denied { map } for pid=22547 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 624.859659] audit: type=1400 audit(1566087438.508:24096): avc: denied { map } for pid=22547 comm="blkid" path="/lib/x86_64-linux-gnu/libuuid.so.1.3.0" dev="sda1" ino=2819 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 625.017226] audit: type=1400 audit(1566087438.638:24097): avc: denied { create } for pid=22527 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:19 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00') bind$llc(r3, &(0x7f00000000c0)={0x1a, 0x103, 0x3, 0x3, 0x80000000, 0x489, @broadcast}, 0x0) 00:17:19 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x0, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 625.271813] audit: type=1400 audit(1566087438.638:24098): avc: denied { write } for pid=22527 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:19 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x54}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:19 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 625.574196] audit: audit_backlog=65 > audit_backlog_limit=64 00:17:20 executing program 1: r0 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x4, 0x100) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000100)={{0x0, 0x3, 0x6, 0x0, 0x1}, 0x9, 0xfffffffffffffc00}) r1 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000040)) 00:17:20 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x800000000000000, 0x0, 0x0, 0x0, 0x7f, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:20 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmctl$IPC_RMID(r2, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000040)={0x3, 0x80000001, 0xffffffffffffa620, 0x9, 0x3, 0x8000, 0x4, 0x0, 0x1b66, 0x1, 0x4, 0x3ff}) 00:17:20 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x3c00000000000000, 0x1000, 0x4) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:20 executing program 1: r0 = epoll_create1(0x0) setxattr$trusted_overlay_upper(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0xfd, 0x0, 0x4, "041877fe390f18430e53d528373f1c80", "11f8ea92c59f4989f629eb755c0d45168c0c2d2146ad855316430c025c2170646616a2bfcf18aa3e8c41a1e3f106e20a2bd64dbfb154d438a6c8ea7adb95e55353da8bc5b2ef1c6ada337ddfd2e7d7c8e2e1170a976a34458b7da131bd40b2e47796370f85334a508760e382e431fbf4cc79b0e92fd92c69b55eafc65da4fe24f2cae396958f53f61fc28ccc1bf238e3eae690db3e39fc67c23d773330e8167e0b9cdc34ceff06fd4f97fb3aabb4e7fae5cc8ae605325f408c04693fe2d44dc0045e18b85e3a114234e011ec215f2f63fbb0ac31e078ae2a7d7c31b534f1f05eb59e8f1a1501270f"}, 0xfd, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:21 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x0, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x4) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:21 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:21 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:21 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r2 = dup3(r0, r1, 0x80000) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000080)=0x7, 0x4) syz_genetlink_get_family_id$tipc2(0x0) 00:17:21 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:21 executing program 1: r0 = epoll_create1(0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:22 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x0, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x280, r2, 0x0, 0x70bd2d, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x28, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_LINK={0xd0, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x800}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfdc80000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8046}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x33a7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xcdf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffff7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8501}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff14}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_LINK={0x34, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10000}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0xd4, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6883}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x64ad}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8df1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfffffffffffffffc}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x280}, 0x1, 0x0, 0x0, 0x80}, 0x4004814) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000600)='/dev/null\x00', 0x3, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000640)={0x0, 0x81}, &(0x7f0000000680)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f0000000700)=@sack_info={r4, 0x9, 0x9}, &(0x7f0000000740)=0xc) 00:17:22 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f00000003c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x7fff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(r3, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:22 executing program 1: r0 = epoll_create1(0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/create\x00', 0x2, 0x0) r1 = syz_open_dev$swradio(&(0x7f00000001c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0xc10c5541, &(0x7f0000000200)={0xda, 0x3, 0x3ff, 0x0, 0x0, [], [], [], 0x8, 0x200}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) getsockopt$bt_BT_CHANNEL_POLICY(r4, 0x112, 0xa, &(0x7f0000000100)=0x69, &(0x7f0000000140)=0x4) ioctl$IMCLEAR_L2(r3, 0x80044946, &(0x7f00000000c0)=0x6) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) 00:17:22 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:22 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.usage_sys\x00', 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001580)={{{@in6=@dev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@ipv4}}, &(0x7f0000001680)=0xe8) sendmsg$nl_route(r0, &(0x7f0000001940)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001900)={&(0x7f00000016c0)=@getlink={0x214, 0x12, 0x2, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x0, r1, 0x2, 0x20}, [@IFLA_VFINFO_LIST={0x1f4, 0x16, [{0x10, 0x1, [@IFLA_VF_TRUST={0xc, 0x9, {0xff, 0xffffffffffff7fff}}]}, {0xec, 0x1, [@IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x7, 0x81}}, @IFLA_VF_VLAN_LIST={0x2c, 0xc, [{0x14, 0x1, {0x2, 0x9b9, 0x1, 0x8100}}, {0x14, 0x1, {0x7, 0xc74, 0x77, 0x8100}}]}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0x6, 0xffff}}, @IFLA_VF_TRUST={0xc, 0x9, {0x100000001, 0x1b}}, @IFLA_VF_RATE={0x10, 0x6, {0xffff, 0x100000001, 0xf1}}, @IFLA_VF_VLAN_LIST={0x54, 0xc, [{0x14, 0x1, {0x4, 0xd10, 0xffffffffffffff26, 0x88a8}}, {0x14, 0x1, {0x7, 0x27, 0x80, 0x88a8}}, {0x14, 0x1, {0x7f, 0xa48, 0x0, 0x8100}}, {0x14, 0x1, {0x0, 0xd4, 0x6, 0x8100}}]}, @IFLA_VF_VLAN={0x10, 0x2, {0x2, 0x2df, 0x5}}, @IFLA_VF_IB_PORT_GUID={0x14, 0xb, {0xa0, 0x3}}]}, {0xf4, 0x1, [@IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x7, 0x9}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x5, 0x80}}, @IFLA_VF_IB_NODE_GUID={0x14, 0xa, {0x5, 0x3}}, @IFLA_VF_VLAN_LIST={0x68, 0xc, [{0x14, 0x1, {0x6, 0xaab, 0x4a9, 0x8100}}, {0x14, 0x1, {0x1c2, 0x146, 0x9, 0x8100}}, {0x14, 0x1, {0x10000, 0x86d, 0x6, 0x88a8}}, {0x14, 0x1, {0xffffffffffff0001, 0x962, 0x4, 0x88a8}}, {0x14, 0x1, {0x4, 0x908, 0x7fffffff, 0x88a8}}]}, @IFLA_VF_MAC={0x28, 0x1, {0xb33}}, @IFLA_VF_RSS_QUERY_EN={0xc, 0x7, {0x2, 0x2}}, @IFLA_VF_VLAN={0x10, 0x2, {0x7fff, 0x80a, 0x80000000}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0xfffffffffffff800, 0xf987}}, @IFLA_VF_SPOOFCHK={0xc, 0x4, {0x2, 0x80000001}}]}]}]}, 0x214}, 0x1, 0x0, 0x0, 0x4000000}, 0x8041) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x40000, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_client='access=client'}, {@cache_fscache='cache=fscache'}, {@mmap='mmap'}, {@version_u='version=9p2000.u'}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@hash='hash'}]}}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000340)=0xffff) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:22 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:23 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) get_mempolicy(&(0x7f0000000080), &(0x7f00000000c0), 0xfff, &(0x7f0000ffd000/0x2000)=nil, 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0x100}) 00:17:23 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000159c23000400f9ffad430100000000009500be85a704becc43ae0000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r0 = syz_open_dev$radio(&(0x7f00000004c0)='/dev/radio#\x00', 0x2, 0x2) recvmsg(r0, &(0x7f0000002800)={&(0x7f0000000500)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @empty}}}, 0x80, &(0x7f00000017c0)=[{&(0x7f0000000580)=""/132, 0x84}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/107, 0x6b}, {&(0x7f00000016c0)=""/246, 0xf6}], 0x4, &(0x7f0000001800)=""/4096, 0x1000}, 0x20) r1 = open(&(0x7f0000000440)='./file0\x00', 0x101001, 0x9c) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f0000000480)=0x7ff, 0x4) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) recvfrom$llc(0xffffffffffffffff, &(0x7f0000000300)=""/228, 0xe4, 0x40010041, &(0x7f0000000400)={0x1a, 0x200, 0x3, 0x1, 0x8, 0x8, @dev={[], 0xd}}, 0x10) [ 629.063581] kauditd_printk_skb: 350 callbacks suppressed [ 629.063589] audit: type=1400 audit(1566087443.408:24441): avc: denied { map } for pid=22701 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:23 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x0, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 629.234646] audit: type=1400 audit(1566087443.468:24442): avc: denied { map } for pid=22701 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:23 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r1, 0xc01064b5, &(0x7f00000002c0)={&(0x7f0000000280)=[0x0, 0x0], 0x2}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000480)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x812000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)={0x1c, r3, 0x200, 0x70bd26, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x8000) ioctl$sock_bt_cmtp_CMTPCONNADD(r1, 0x400443c8, &(0x7f0000000300)={r2, 0x4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:23 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:23 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x0, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 629.383352] audit: type=1400 audit(1566087443.478:24443): avc: denied { map } for pid=22701 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:23 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0xffff) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@dev={0xfe, 0x80, [], 0x2a}, 0x40000000000004, 0xc06d286400548d85, 0x3, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 629.588781] audit: type=1400 audit(1566087443.498:24444): avc: denied { map } for pid=22701 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:24 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0xbc7f49e840d6f135}, "c761161377aff7a3", "e3eee3072015084dffee1862e6d266859441562b7496ea31d8e41a0b46b7b2e9", "9f9359f1", "380ae67f792d251d"}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070619000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:24 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)) ioctl$EVIOCSMASK(r3, 0x40104593, &(0x7f0000001100)={0x1f, 0x1000, &(0x7f0000000100)="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"}) signalfd4(r2, &(0x7f00000000c0)={0xef4c}, 0x8, 0x80000) [ 629.767937] audit: type=1400 audit(1566087443.518:24445): avc: denied { map } for pid=22701 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:24 executing program 5: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) ptrace$peek(0x2, r0, &(0x7f0000000280)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r1, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) [ 629.970201] audit: type=1400 audit(1566087443.528:24446): avc: denied { map } for pid=22701 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.152563] audit: type=1400 audit(1566087443.538:24447): avc: denied { map } for pid=22701 comm="blkid" path="/lib/x86_64-linux-gnu/libc-2.13.so" dev="sda1" ino=2784 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 630.192800] audit: audit_backlog=65 > audit_backlog_limit=64 [ 630.209540] audit: audit_backlog=65 > audit_backlog_limit=64 [ 630.236645] audit: audit_lost=615 audit_rate_limit=0 audit_backlog_limit=64 00:17:24 executing program 1: r0 = epoll_create1(0xd16d27b9cf181cb2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x10001, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f0000000140)='nbd\x00') r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x301000, 0x0) getsockname$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0}, &(0x7f0000000300)=0x14) setsockopt$packet_drop_memb(r3, 0x107, 0x2, &(0x7f0000000340)={r6, 0x1, 0x6, @remote}, 0x10) r7 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/checkreqprot\x00', 0x204000, 0x0) sendmsg$NBD_CMD_CONNECT(r3, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x38, r4, 0x400, 0x70bd29, 0x25dfdbff, {}, [@NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r5}]}, @NBD_ATTR_SOCKETS={0xc, 0x7, [{0x8, 0x1, r7}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x7}]}, 0x38}, 0x1, 0x0, 0x0, 0xfd4c8dbbc437c3c7}, 0x4000000) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000440)={0xffffffffffffffff, r5, 0x0, 0xb, &(0x7f0000000400)='$em0cgroup\x00', 0xffffffffffffffff}, 0x30) perf_event_open(&(0x7f0000000380)={0x6bc76796f1804a23, 0x70, 0x9, 0x3, 0x3ff, 0xfffffffffffffffd, 0x0, 0x7577, 0x40, 0x0, 0x100000001, 0x88, 0x6, 0xfffffffffffffffa, 0x400, 0x80000001, 0x3, 0xffffffff, 0x800, 0x73, 0xfffffffffffffffc, 0x9, 0x9, 0xfffffffffffff6a3, 0x30000000000000, 0x3, 0x5, 0x5, 0x100000001, 0xdf, 0x76a6, 0x1d7, 0x3, 0x3, 0xf531a38, 0x4, 0xa1cc, 0x80, 0x0, 0x9d, 0x1, @perf_config_ext={0x3ff, 0x8001}, 0x1, 0xcf0, 0x9, 0x1, 0x0, 0x100, 0x5}, r8, 0x9, r3, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) syz_open_dev$vivid(&(0x7f0000000480)='/dev/video#\x00', 0x2, 0x2) 00:17:24 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x0, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:24 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xc, 0x20, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:25 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x0, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:25 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000001280), 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) wait4(r4, &(0x7f0000001100), 0x9, &(0x7f00000011c0)) getsockopt$bt_hci(r3, 0x84, 0x6d, &(0x7f0000000080)=""/4096, &(0x7f00000010c0)=0x1000) getpgrp(r4) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001080)={'team0\x00', 0x0}) r6 = fcntl$dupfd(r3, 0x406, r3) ioctl$NBD_SET_TIMEOUT(r6, 0xab09, 0x20000000000000) openat$cgroup_subtree(r6, &(0x7f0000001300)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001180)={@dev={0xfe, 0x80, [], 0x14}, 0x20, r5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:25 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)) 00:17:25 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x2, 0x101000) ioctl$SIOCAX25OPTRT(r0, 0x89e7, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, 0x2, 0x44}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:25 executing program 2: r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) fcntl$getown(r0, 0x9) socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000300)='/dev/ppp\x00', 0x400, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x80000001, 0x42, 0x10001) r4 = dup(r3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:17:25 executing program 1: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x1a1000, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, &(0x7f0000000240)) r1 = epoll_create1(0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x80000) getsockopt$inet6_buf(r4, 0x29, 0xd3, &(0x7f00000000c0)=""/233, &(0x7f00000001c0)=0xe9) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000040)) 00:17:25 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x0, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28683a4102e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = dup2(r1, r0) ioctl$KVM_SET_CPUID(r2, 0x4008ae8a, &(0x7f0000000040)={0x1, 0x0, [{0xc0000001, 0x7fff, 0x5}]}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:26 executing program 0: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x0, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:26 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) write$P9_RWALK(r3, &(0x7f00000000c0)={0x3d, 0x6f, 0x1, {0x4, [{0x80, 0x3, 0x8}, {0x12, 0x0, 0x5}, {0x10, 0x2, 0x2}, {0xc1, 0x1, 0x8}]}}, 0x3d) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f0000000040)) 00:17:26 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0x9, 0x14000) write$apparmor_current(r2, &(0x7f0000000380)=@hat={'changehat ', 0x2, 0x5e, ['nodev}+nodevsystem-\x81procproc-wlan0\x00', '/dev/usbmon#\x00', 'bdevnodev^[system\x00', '!posix_acl_access.bdev[keyring%wlan0&cgroup/\x00', '\x00', '/dev/usbmon#\x00', '/dev/usbmon#\x00', '}\x00']}, 0xa9) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1, 0x800) 00:17:26 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) r0 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x10, 0xf6c6478e1803ec50) getsockname$tipc(r0, &(0x7f0000000140)=@name, &(0x7f0000000180)=0x10) 00:17:26 executing program 1: r0 = epoll_create1(0x80000) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f00000000c0)=0x5) r3 = dup3(r2, r2, 0x80000) ioctl$KDGETKEYCODE(r3, 0x4b4c, &(0x7f00000001c0)={0x1, 0x6}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) ioctl$KVM_GET_MP_STATE(r3, 0x8004ae98, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'batadv0\x00', 0x400}) 00:17:27 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x0, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:27 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000000c0)=ANY=[@ANYBLOB="b702000001000000bfa30000000000000703000000fefbff7a0af0fff8ffffff79a4f0ff00000000b7060000ff57f523bf06a72a5900000065040400010000000404000001076d60b7030000000000006a0a00fe180000008500000017000000b70000000000000095000000000000000d7a28682b4502e4aeb54f36633e27c279341bf489903cfdb4c05e96e3046f04e77969be0634674d0942b66b249b3518598e7e290b39a6f2fc2a5e019bc6b45684f002cf57bf887e83fbb2215b9a34e6bdc4dc1af6d3c69553a4bddac602e0048bec11e874602f925b6dbd2af21b75fe26aa5e85ae2a1993bfa213923bb755c1f1abd196407b4c8fabe27b2121a5f03dff2cede5eba093"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x100000000000001, 0x84) bind$inet6(r3, &(0x7f0000001280), 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000040)={0x0, 0x0}) wait4(r4, &(0x7f0000001100), 0x9, &(0x7f00000011c0)) getsockopt$bt_hci(r3, 0x84, 0x6d, &(0x7f0000000080)=""/4096, &(0x7f00000010c0)=0x1000) getpgrp(r4) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000001080)={'team0\x00', 0x0}) r6 = fcntl$dupfd(r3, 0x406, r3) ioctl$NBD_SET_TIMEOUT(r6, 0xab09, 0x20000000000000) openat$cgroup_subtree(r6, &(0x7f0000001300)='cgroup.subtree_control\x00', 0x2, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000001180)={@dev={0xfe, 0x80, [], 0x14}, 0x20, r5}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r0, 0x18000000000002a0, 0xe, 0x0, &(0x7f00000006c0)="b9ff0300000d698cb89e40f02cea", 0x0, 0x44a}, 0x28) 00:17:27 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:27 executing program 1: r0 = epoll_create1(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x80, 0x400080) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={r2, r3, r4}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/fuse\x00', 0x2, 0x0) dup3(r5, r6, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r5, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r6, &(0x7f0000000040)) personality(0x2000000) 00:17:27 executing program 0 (fault-call:3 fault-nth:0): clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:17:28 executing program 1: fchdir(0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000040)={0x7ff, 0x7d, 0x81, 0x1, 0x4, 0x0, 0x40, 0x0, 0x6, 0x0, 0x800}, 0xb) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f0000000000)) flistxattr(r2, &(0x7f00000000c0)=""/59, 0x3b) socket$inet_dccp(0x2, 0x6, 0x0) 00:17:28 executing program 5 (fault-call:3 fault-nth:0): clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:28 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0xffffffffffffffff) 00:17:28 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r0, 0x0, 0x21, &(0x7f00000000c0)='vboxnet0%:vboxnet1selinux.wlan1#\x00'}, 0x30) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x9, 0x7, 0x8, 0x6, 0x0, 0x1, 0x8001, 0x1, 0x0, 0xb6, 0x80000001, 0x0, 0x3, 0xfdf9, 0xdec, 0xa378, 0x2, 0x3, 0x200000009, 0xff, 0xa26c, 0x1, 0xf90, 0x1, 0x8, 0x65b, 0x1, 0xf7e2, 0x9, 0xfffffffffffffffa, 0x101, 0x7, 0x80000001, 0x101, 0xe423, 0x2, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000000080), 0x2}, 0x82, 0x0, 0x200, 0x3, 0x1f, 0x6, 0x3}, r1, 0x10, r0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:28 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x0, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 634.135624] kauditd_printk_skb: 355 callbacks suppressed [ 634.135630] audit: type=1400 audit(1566087448.498:24794): avc: denied { map } for pid=22855 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 634.239236] audit: type=1400 audit(1566087448.498:24795): avc: denied { map } for pid=22855 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:28 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000280)={0x0, 0x27, "7eb9e9713da40091980b3b6cdb56c1a564314554d995c52e48526cefe9631e67f0578200fd2f6a"}, &(0x7f00000002c0)=0x2f) r5 = dup3(r1, r2, 0x80000) dup(r1) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x18, &(0x7f0000000300)={r4, 0x3}, 0x8) ioctl$UFFDIO_ZEROPAGE(r5, 0xc020aa04, &(0x7f0000000340)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x1}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) r6 = getuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='9p\x00', 0x1b72dd4042448465, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u='version=9p2000.u'}, {@privport='privport'}, {@noextend='noextend'}, {@version_u='version=9p2000.u'}, {@msize={'msize', 0x3d, 0x2}}], [{@smackfsdef={'smackfsdef', 0x3d, ',-wlan1lo'}}, {@appraise_type='appraise_type=imasig'}, {@dont_measure='dont_measure'}, {@hash='hash'}, {@smackfsroot={'smackfsroot'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '&cgroup(vboxnet1em0&^'}}, {@fowner_lt={'fowner<', r6}}]}}) 00:17:28 executing program 0: clone(0x2800800, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:17:28 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x10000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000600)={0x0, 0x0}, &(0x7f0000000640)=0xc) r3 = getegid() r4 = getpid() r5 = geteuid() getresgid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)=0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000e40)={0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000e80)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000f00)='\x00', &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000fc0)='/proc/capi/capi20ncci\x00', 0x80, 0x0) r11 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000001000)='/selinux/context\x00', 0x2, 0x0) r12 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000001040)='/proc/capi/capi20ncci\x00', 0x81, 0x0) r13 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000001080)={0x28, 0x0, 0x2710, @reserved}, 0x10, 0x80800) r14 = accept4$packet(0xffffffffffffffff, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001100)=0x14, 0x80000) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000001140)={0x3, 0xffffffffffffffff, 0x1}) r16 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000001180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r17 = openat$selinux_access(0xffffffffffffff9c, &(0x7f00000011c0)='/selinux/access\x00', 0x2, 0x0) r18 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001240)={&(0x7f0000001200)='GPL\x00'}, 0x10) r19 = memfd_create(&(0x7f0000001280)='GPL\x00', 0x1) r20 = syz_open_dev$dmmidi(&(0x7f00000012c0)='/dev/dmmidi#\x00', 0x5, 0x80000) r21 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f00000015c0)=[{&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000300)="24fe8a962777bb30d47b528d33034896d611fd", 0x13}, {&(0x7f0000000340)="34ee43b4fc29c2bccebfa279876674b849ca2fe05e4ed1c5f88194785ec0a4617fc6b718c77944c5bddcfc4245b6ce755a97251c5838ef72903c5225a589d05dfb4a5bb11930ef9604ac124fd63e", 0x4e}, {&(0x7f00000003c0)="76c6cbe714b0ec1b51725fc9cd9a1b5f22e5fd8562693566861fed0c8735771e34d99c971a67ceb958726694d829a9c4e0ff945007e7a122bb544c3cd66061d43cfdd06be0bc58b7a138", 0x4a}, {&(0x7f0000000440)="ef9bbb38854e1fc7d8cfa43d9994c3640b5c705d9cc2e65bcfba92e50a02e1bacc5ce8d649901f9f36e91ae36445869f96111d09a9bc4c39adac21ae4edc96649e45084ba4929a5d0c777f0a36e73f84f63be90cf95d02f0169038340dd285977cebad405d22c22380e0bf87bd2d0fc340ab6fbf4e5c2d725f27907ed9e5f65d1005a9369d8f98b0d9d05144a43ea474f2f030060b21203ff491c35040878300533fc812d610043098101e3cd0f29cc568dd60aad3f0d757182bff937a0a58ad2b2d91706d2d3f53c03b5110efbc68f5c2180c6cdd7bee", 0xd7}], 0x4, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0x1}, {&(0x7f0000000780)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000800)="c8c7f64b2c413696c6cd52e89fcc4e84546b796d0c03350e727862b4f4e67838d2a378272339190f23ccae796fbfc26587d0f49c127f210ab539b8863d9308ffd83ac0e07f3a1c06274187b7f22eb5c84e912aa1a28ec5090abb92678d84995ed5db9d2d59d19c6a4916d82832f3c6b1fac856cb1a62f7218748a05677171af8987308b70ea651f8c99ffb4513c999bd3c58e2aea4e84ecb1dab770f6f9d8d299e3734e1a6f54dcd711e149ccba35ecf1a9913e6eaa20d0271cc6574f8", 0xbd}, {&(0x7f00000008c0)="7c1019b8bce5884d7c0c5641dfc484a5f432dc3f775e65f9e87ca3db4dbb28b7c115308161381f1afa818c5e36f408846e08066389367dc5204fa0cb1d81cc7d416ee5194fec30dce9cdab24b49d06b61f31fd5cd24b2e421efb45711d7968e69ebb3a33c57e6acae79b222795f37bc93fba459ae2778655e6832e82b56c8f2d464428ac3e4b11fae2a5d474bfc3e127c7b00a651e18cfdf6a339ef7158ff19b231d4cbc87ac91a7c3d6187a3dd715b8fd0bc5b810be162209e027f632dbb013eba875787a693e8d86258ea9", 0xcc}, {&(0x7f00000009c0)="b455a4ea87c2448d907dbfdbe5520c269cae52e91ae2b2bad3639a97254fcdbf504c1f18f36963235c91b1c9845c19008c427ac1a465c487036081d10fab9551e87c55e16bfc61232dc26ffd8748ebe6a5e4e9c49f90b8e5e9f93bbb6cee24cc2de85a254fbd312abbdf635eed0909e5dfdc863305f60441d6724c7d313b8baf0cd102a9362a3fa998d1ace5b8919218f4cca2cd5e7f857ddc709fb2db7d7b028ea48fe01f2d3aef1af9", 0xaa}, {&(0x7f0000000a80)="7e003194389e976ac8d159623e672be9844c994d264442a27d5067448aa7368b7df180aaefbdfb36a754ae95adbc1c3ec3641345079d8b58c0bdbb0420268b0c61b60fe85c7633e8f229ce3aeeb85997b5f44137e4e04487f79b74f4c63faccc3caa1c82ef168569c2de4ab5d20476cd1307d5752ed9f48ba9a8bcc58ff50124aae82c942bea4c72c405ce6d7369dafb7723cbfb559846dc065de60e4c00d84926c58dea5c850cef114e59eccdbeb41150e1a822fec7976987de84", 0xbb}, {&(0x7f0000000b40)="4a2b097b4d6a651c3ccc450bff9bdaf300299168d9ff79ef6d1ea80407b2a2d7c175f38c572b1cebba661cb38d26a528eec57c16370c27a8e145bce57e6559147bff96a633c3a4d51142574c54ea9b86a9beb086859f9c3f0121a145967ab1de32496b50c9dbbb0c5d918fad2c511235", 0x70}, {&(0x7f0000000bc0)="83a7a0dcec1ace82d597cd91f32d39b72c4ab20041d050d62b87a39f424e2000dd7f4fa2a2101660", 0x28}, {&(0x7f0000000c00)="be1d3a0f034422877c0c8d83d2099656999bb36c8f1ed2e333fa7ca48291bdb4e870fc8c5d05a2f9937a957c383b50809ca86f3ffbbfa029a0f1a25c31db28d84d9b600dd72737b6a3ca11c04545ea6c34daaa7b66d179e38e470cce339eded6aca8a3071e777e5775e7e2791c42b2e79d2b9599f8c9cc9a897d0fa5306868904da3785c4391f51b793b94d3e23007673474e76c0b4475d480fe56b7c73fe14f95a3af36b063bc1cf5eb4872fea2ce77a1158169", 0xb4}, {&(0x7f0000000cc0)="1b1ec925cf748108334dfa74b2c795666126d045f825e21c08c62f106ed41a5d9bdd654288d03846fefdf7ed5e7c40787442a94b9a5300b2086c43ceabb5babaef42e161fe8ac64581ed27fecd203171b8ed390cd9e7badbbd1be907be5b9c9248cbbeaf0ad43a4e20fecf26305d10c9c1a12f3023f831276b7104aec0f0714aaa971ed35639f43f70a727b5d1f50aa7fd9fd4da9586ff151790a7321501185f1b96e852085cb939b1abe1a6e625825469fa14b0ceac7e54b0db2376b70ef3ecac3069738c22d80742dc9f503f81245ef784d6", 0xd3}], 0x8, &(0x7f0000001300)=[@cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @rights={{0x24, 0x1, 0x1, [r10, r11, r12, r13, r14]}}, @rights={{0x2c, 0x1, 0x1, [r15, r16, r17, r18, r19, r20, r21]}}], 0x78, 0x44890}, {&(0x7f0000001380)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001580)=[{&(0x7f0000001400)="81c197dfb3f647b5ae7459499fb0ea3a0e04b4d334cbb6355a23a0db28246b2512f210d34c5e4d3605f866876376b833606a333c20d7afd3bcb1ed7f26c6e5abc77258a3eb4cde4cff224efee9273221b0d3d723765a347717b7c52f15c5805ce01a35732e128724dfac7cbd18655b2106e4f8d856b051d37796b0faa2c50670120369438f7e843854b10c57b64700c6d343046a869faa66960fbc0e1be567d11d0494c933c7f4b04970", 0xaa}, {&(0x7f00000014c0)="dc50929e1dacf48fd6226dcd30d0428b6596edaa4e4907219e5068c725039b28ea24993a5212fedb7c48ac44bb07f7dd3ce880903b86fbbcadbd068c6cc056b298b12078feff8a57432937902c79f24ff95651b3ac986afc2c4bf220a72b662d4c66f970c7438406b2c368e61f2c4783ab89d2f4eac2d0bc", 0x78}, {&(0x7f0000001540)="d2ec6c6b9ad72e3f5f60120ea2728faa46ce", 0x12}], 0x3, 0x0, 0x0, 0x80}], 0x3, 0x4000000) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee600117c49ab8439707f001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) exit(0x100000041) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) [ 634.460122] audit: type=1400 audit(1566087448.518:24796): avc: denied { map } for pid=22855 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 634.582131] audit: type=1400 audit(1566087448.518:24797): avc: denied { map } for pid=22855 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:29 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f00000003c0)=0x29c) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x379) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 634.758591] audit: type=1400 audit(1566087448.538:24798): avc: denied { map } for pid=22855 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:29 executing program 1: epoll_create1(0x1f29c83a2c54798) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000540)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0x800000000e004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000740)={0x3, 0x2, 0xf000, 0x1000, &(0x7f0000015000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f004}) r4 = socket$tipc(0x1e, 0x20000003, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000180)=[@text16={0x10, &(0x7f0000000100)="640ff24101660f08f20f1bfa0f20e06635000040000f22e0bad004b00fee36260f01dfaa8fc900010b0f080f005b9a", 0x2f}], 0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFPFLAGS(0xffffffffffffffff, 0x8934, 0x0) fallocate(0xffffffffffffffff, 0x1, 0x9, 0x0) r5 = fcntl$getown(r4, 0x9) perf_event_open(0x0, r5, 0xe, 0xffffffffffffffff, 0x8) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) r6 = openat$full(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f0000000480)=@assoc_value, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) r7 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchdir(r7) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000100)=""/102, &(0x7f0000000180)=0x66) 00:17:29 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x200000, 0x0) ioctl$TUNSETNOCSUM(r0, 0x400454c8, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000450e00bf67000000000000150600000fff0700350600000200000073ea11c6b3027483a014660e84e7c7e3070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400"/176], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 634.994545] audit: type=1400 audit(1566087448.568:24799): avc: denied { map } for pid=22855 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 635.018847] audit: audit_backlog=65 > audit_backlog_limit=64 [ 635.058602] audit: audit_backlog=65 > audit_backlog_limit=64 [ 635.069918] audit: audit_lost=619 audit_rate_limit=0 audit_backlog_limit=64 [ 635.084839] audit: audit_backlog=65 > audit_backlog_limit=64 00:17:29 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x0, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:29 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f00000000c0)={@host}) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67001767ce0000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000493f9ffad43010008000000950000000000000005000000000000009500000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) ioctl$DMA_BUF_IOCTL_SYNC(r0, 0x40086200, &(0x7f0000000140)=0x2) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:30 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x9, 0x101000) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@loopback, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000500)={{{@in6=@local, @in=@dev={0xac, 0x14, 0x14, 0x29}, 0x4e22, 0x0, 0x4e21, 0x5, 0xa, 0x20, 0xa0, 0x3a, r1, r2}, {0x7, 0x400, 0x2, 0x6, 0x5, 0x9, 0x1, 0x5}, {0x80000000, 0x41, 0x80000001, 0x4}, 0x5, 0x0, 0xbbdd099639e0d11a, 0x6008870c1dc198da, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4d4, 0x3c}, 0x2, @in6=@empty, 0x3502, 0x3, 0x3, 0x3, 0x67506f66, 0x3f, 0x6}}, 0xe8) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) 00:17:30 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80, 0x0) ioctl$VIDIOC_G_AUDIO(r0, 0x80345621, &(0x7f00000000c0)) syz_genetlink_get_family_id$tipc2(0x0) 00:17:30 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:30 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x20000, 0x0) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) getresuid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)=0x0) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r0, r1, r2) 00:17:30 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f65000000000000650700000200000007070476ae1f17cb9b3d1b4f4343d500004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x400, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000240)={0x7, 0x6db, 0x80}) exit(0xffffffffffffffff) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x424000, 0x0) ioctl$VIDIOC_SUBDEV_G_CROP(r1, 0xc038563b, &(0x7f00000000c0)={0x1, 0x0, {0x7, 0x3ce, 0x4, 0x6}}) 00:17:30 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x0, 0x0) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:31 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r3, 0x4008240b, &(0x7f0000000100)={0x0, 0x70, 0x7, 0x2, 0x100, 0xffffffff, 0x0, 0x1, 0x40000, 0x2, 0xfffffffffffff4b0, 0x1, 0x9, 0x0, 0x10001, 0x3d7ef352, 0x5, 0x7, 0x1, 0x8, 0x7f, 0x8, 0x6, 0x9, 0x40, 0x6, 0x2f1, 0x1, 0x20, 0x5, 0x2, 0x4, 0x3, 0x8, 0x6, 0x8, 0x1, 0xffffffff, 0x0, 0x9, 0x1, @perf_bp={&(0x7f0000000040), 0xe}, 0x118, 0x0, 0xfffffffffffffffc, 0x3, 0x1ff, 0x4}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f00000000c0)={0x100}) 00:17:31 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x0, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:31 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61120c00000000000213500000000000bf2000000000000007000000080000003d03010000000000950000000000000069260000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) socket$bt_hidp(0x1f, 0x3, 0x6) 00:17:31 executing program 5: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r0 = syz_open_dev$usb(&(0x7f0000000080)='/dev/bus/usb/00#/00#\x00', 0x8000, 0x200000) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000000c0)={0x3f, 0x7fffffff, 0x43e, 0x51d, 0x11, 0xa0f, 0x7, 0x2, 0x9, 0x5d, 0xd5, 0x7}) exit(0xffffffffffffffff) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f0000000140)=0x203) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:31 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f00000000c0)={0x8}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:31 executing program 1: r0 = accept$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000100)=0x14) write(r0, &(0x7f0000000140)="13c95247", 0x4) r1 = epoll_create1(0x0) r2 = syz_open_dev$swradio(&(0x7f0000000180)='/dev/swradio#\x00', 0x1, 0x2) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f00000001c0)={0x6, 0x7}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000000040)) 00:17:31 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x410000, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) recvmmsg(r0, &(0x7f0000008540)=[{{&(0x7f0000000140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x80, &(0x7f0000002540)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/108, 0x6c}, {&(0x7f0000001300)=""/132, 0x84}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/107, 0x6b}, {&(0x7f00000000c0)}, {&(0x7f0000002440)=""/160, 0xa0}, {&(0x7f0000002500)=""/57, 0x39}], 0x8, &(0x7f00000025c0)=""/187, 0xbb}, 0x401}, {{0x0, 0x0, &(0x7f0000003680)=[{&(0x7f0000002680)=""/4096, 0x1000}], 0x1}, 0xfbf1}, {{0x0, 0x0, &(0x7f0000003980)=[{&(0x7f00000036c0)=""/125, 0x7d}, {&(0x7f0000003740)=""/225, 0xe1}, {&(0x7f0000003840)}, {&(0x7f0000003880)=""/196, 0xc4}], 0x4}}, {{&(0x7f00000039c0)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000004a40)=[{&(0x7f0000003a40)=""/4096, 0x1000}], 0x1, &(0x7f0000004a80)}, 0xb6}, {{&(0x7f0000004ac0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000004c40)=[{&(0x7f0000004b40)=""/211, 0xd3}, {&(0x7f0000005540)=""/4096, 0x1000}, {&(0x7f0000006540)=""/4096, 0x1000}], 0x3}, 0xfff}, {{&(0x7f0000004c80)=@pppoe={0x18, 0x0, {0x0, @local}}, 0x80, &(0x7f0000005000)=[{&(0x7f0000004d00)=""/52, 0x34}, {&(0x7f0000004d40)=""/223, 0xdf}, {&(0x7f0000007540)=""/4096, 0x1000}, {&(0x7f0000004e40)=""/151, 0x97}, {&(0x7f0000004f00)=""/74, 0x4a}, {&(0x7f0000004f80)=""/123, 0x7b}], 0x6, &(0x7f0000005080)=""/131, 0x83}, 0x5}, {{&(0x7f0000005140)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, 0x80, &(0x7f0000005380)=[{&(0x7f00000051c0)=""/7, 0x7}, {&(0x7f0000005200)=""/181, 0xb5}, {&(0x7f00000052c0)=""/184, 0xb8}], 0x3, &(0x7f00000053c0)=""/196, 0xc4}, 0x7f}], 0x7, 0x20, &(0x7f0000008700)={0x0, 0x989680}) exit(0xffffffffffffffff) 00:17:32 executing program 3: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0xb00, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000140)={{0xa, 0x4e23, 0x2c, @dev={0xfe, 0x80, [], 0x1f}, 0x7176}, {0xa, 0x4e20, 0xfffffffffffffffe, @local}, 0x1, [0x5, 0x100, 0xffffffff, 0x9, 0x7, 0xc0, 0x9, 0x2]}, 0x5c) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x0, 0x8000000000}, 0x8, 0x10, &(0x7f0000000000), 0x6}, 0x70) exit(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x120000) syz_genetlink_get_family_id$tipc2(0x0) 00:17:32 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:32 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x0, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:32 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) signalfd4(r1, &(0x7f00000011c0)={0x5}, 0x8, 0x800) readv(r2, &(0x7f0000001180)=[{&(0x7f00000000c0)=""/51, 0x33}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/26, 0x1a}, {&(0x7f0000001140)=""/38, 0x26}], 0x4) 00:17:32 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r2 = dup3(r0, r1, 0x80000) ioctl$VIDIOC_S_INPUT(r2, 0xc0045627, &(0x7f0000000080)=0x8) r3 = getpid() wait4(r3, 0x0, 0x20000000, 0x0) 00:17:32 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000080)='/dev/audio#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_SET_UNIQUE(r0, 0x40106410, &(0x7f00000000c0)={0x7f, &(0x7f0000000140)="828de0cf26ed183fa20cffa60dbb78ed8afd9473d397b5ababa02411b4e369a749c1199aa1be3192c12cbd29acb192b860c8cc7f9dcd955ac79da7e239526f364e8f61b2d0d0870f5e15b5d2c5355abfae884a3aaca4226a90174ed0774d8e79d55048ebd99341b1779a7de7e7ec1583f686284311c1bbdaf76518720ae7b7"}) 00:17:32 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x480, 0x0) ioctl$BLKROSET(r3, 0x125d, &(0x7f0000000100)=0xfffffffffffffffc) r4 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r1, &(0x7f0000000140)={0x10000}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:33 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$TIOCMIWAIT(r0, 0x545c, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:17:33 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:33 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000440)='/dev/dlm_plock\x00', 0x101080, 0x0) ioctl$MON_IOCX_GET(r0, 0x40189206, &(0x7f0000000580)={&(0x7f0000000480), &(0x7f00000004c0)=""/164, 0xa4}) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) linkat(r0, &(0x7f0000000300)='./file0\x00', r0, &(0x7f0000000340)='./file0\x00', 0x1400) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000640)={{{@in6=@initdev, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f00000000c0)=0xe8) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x40000, 0x0, 0x0, 0x0, 0x0, [], r1, 0x0, r0, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) r2 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x0, 0x4000) unlinkat(r2, &(0x7f0000000600)='./file0\x00', 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="cc000000", @ANYRES16=r3, @ANYBLOB="02002dbd7000ffdbdf250f0000ee221a2fee2fdff8973700500003000800040076090000080008000400000008000500ac1e01010800030003000000080004002d0c0000080005008000000114000600fe8000000000008f6b50348767d065ec2c5aa1802f0000000000000000130800040006000000600003001400060040e135908bce5d53cd6015730c873ce67e6f6d39d78a041d0fde61080005007f00000108000000001400020073697430000000000000000000000000080004000700000014000600ff020000000000000000000000000001080003000000000008000600feffffff"], 0xcc}, 0x1, 0x0, 0x0, 0x40000}, 0x40) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000400)='IPVS\x00') [ 639.111765] QAT: Invalid ioctl [ 639.145043] QAT: Invalid ioctl 00:17:33 executing program 1: r0 = epoll_create1(0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r0, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x4, 0x0, [], [{0x9, 0x8, 0x6, 0x119, 0x3, 0x8}, {0x100000000, 0x4, 0x0, 0x2, 0xffffffffffff0001, 0x80}], [[], [], [], []]}) setsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f00000000c0)=@int=0x7, 0x4) syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x10000, 0x200800) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x2002}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f0000000240)=""/229) 00:17:33 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x0, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 639.228687] kauditd_printk_skb: 408 callbacks suppressed [ 639.228694] audit: type=1400 audit(1566087453.588:25176): avc: denied { map } for pid=23056 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 639.239240] audit: type=1400 audit(1566087453.608:25177): avc: denied { map } for pid=23056 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:33 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x8, 0x0) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000140)=0x64000000) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x1, 0x0) [ 639.476014] audit: type=1400 audit(1566087453.668:25178): avc: denied { map } for pid=23056 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:33 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(r0, 0xfffffffffffffff9) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:17:33 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000001c2de03d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001ffd4a41c9d928531b7ec55c7dbc5665000000000a000000000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) [ 639.657334] audit: type=1400 audit(1566087453.668:25179): avc: denied { map } for pid=23056 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:34 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000100)={0x6, 0x2, 0xfffffffffffffefd, 0x4, 0x9, 0x1, 0x9, 0xffffffffffff8000, 0x1, 0x80}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) syz_open_dev$sndtimer(&(0x7f00000000c0)='/dev/snd/timer\x00', 0x0, 0x200) [ 639.813492] audit: type=1400 audit(1566087453.688:25180): avc: denied { map } for pid=23056 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 639.943061] audit: type=1400 audit(1566087453.718:25181): avc: denied { map } for pid=23056 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:34 executing program 5: getrlimit(0x4, &(0x7f00000000c0)) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) [ 640.007467] audit: audit_backlog=65 > audit_backlog_limit=64 [ 640.046457] audit: audit_backlog=65 > audit_backlog_limit=64 [ 640.050574] audit: audit_lost=631 audit_rate_limit=0 audit_backlog_limit=64 [ 640.068259] audit: backlog limit exceeded 00:17:34 executing program 3: r0 = accept4(0xffffffffffffffff, &(0x7f0000000080)=@nl, &(0x7f0000000140)=0x80, 0x80800) getsockname$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000001c0)=0x14) clone(0x10800000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000340)=ANY=[@ANYBLOB="61124c00000000000000bf2000000000000007000000080000003d03010000000000950000008a7d8f9aecc89b2c2561000000006926000000000000bf67000000000000150600000ffd07003506000002000000b7441b2e58d9e65ebf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000b754000000000000150400000400f9ffad4301ff00000000950000000000000005000000000000009500000000000000f573b858fdf4ac617d6d9c17b2a632a2ce8403861dd1e8dae46071fdf279"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r1 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0xfaa, 0x8ea4e0445dede656) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r1, 0xc0105303, &(0x7f0000000240)={0xfffffffffffff151, 0x100000000, 0x2}) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:34 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x0, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:34 executing program 1: r0 = epoll_create1(0x0) mq_open(&(0x7f0000000040)='\x00', 0x1, 0xc, &(0x7f00000000c0)={0x8, 0x8000000, 0x4, 0x7fffffff, 0x6, 0x429, 0x80, 0x8001}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000100)) 00:17:34 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/mcfilter\x00') write$FUSE_INIT(r0, &(0x7f0000000140)={0x50, 0x0, 0x3, {0x7, 0x1f, 0x7fff, 0x20000, 0x7fff, 0x3, 0x0, 0x9}}, 0x50) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f00000000c0)={@ipv4, 0x0}, &(0x7f00000001c0)=0x14) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYRESOCT=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0xfffffe2f, 0x0, 0x0, 0x0, [], r1, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0xffffffffffffff22, 0x10, &(0x7f0000000000)={0x3}, 0x255}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:35 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r1 = perf_event_open(0x0, 0x0, 0xa, r0, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x10b000, 0x0) exit(0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='GPL\x00') openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) 00:17:35 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x50000, 0x10a) accept$inet6(r3, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f0000000140)=0x1c) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:35 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r0 = socket(0x5, 0x80000, 0x7) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x9ab, 0xd14, 0x1ff, 0x74f856bb, 0x8001, 0xd, 0x10000, {0x0, @in={{0x2, 0x4e20, @loopback}}, 0x5fe76a60, 0x6df, 0x400, 0xfffffffffffffc00, 0x5}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e23, 0x5, @remote, 0x5}}, 0x6, 0x94f8, 0x3, 0x3ff, 0x8705627c16afb5d8}, 0x98) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf200000000000000700000008a07830450301000000000095000000000000006917000000000000bf67000000000000150600000fff07003506000002ff7f00000600000ee60000bf050000000000001f65005ea549f9a1a22cc80002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43810000000000950000000000000005000000f4ffffff950000f700000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:35 executing program 2: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000440)={0x2, 0x0, @empty}, &(0x7f00000003c0)=0x10) fcntl$getown(r0, 0x9) r1 = socket$key(0xf, 0x3, 0x2) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r4 = socket$inet6(0xa, 0x6a921dd6b02c5de4, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r5 = dup(r4) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r5, 0x0, 0x481, 0x0, &(0x7f0000000300)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r5, 0x1, 0x0, &(0x7f00000007c0)=0x183c8daa0221d7ea, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, 0x0, 0x0) r6 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r5, 0x54a2) ioctl$RTC_IRQP_READ(r6, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r6, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, 0x0) ftruncate(r6, 0x2007fff) sendfile(r5, r6, 0x0, 0x8000ffeffffe) 00:17:35 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001540)={'bond0\x00', 0x0}) r3 = syz_genetlink_get_family_id$net_dm(&(0x7f0000001640)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f0000001700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x8400000}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x14, r3, 0x10, 0x70bd2d, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x0) sendmsg$inet6(r1, &(0x7f00000015c0)={&(0x7f0000000080)={0xa, 0x4e23, 0x3, @mcast1}, 0x1c, &(0x7f00000014c0)=[{&(0x7f00000000c0)="4d134fb5", 0x4}, {&(0x7f0000000140)="54cfbd9380bec55fafcc11d4be90a0e07c1e70b72ef95e9fa3381715d9612050f73df64d61c2e73c5103cca4c7cfcc44b69d7b7104d531affc775ddeaacd0442a4a9b4f6b2c0673b95dab83ecda2bb54947c37486ffa657c94abc6cdd4e73e5c452e6fe6ef9660cebc3d57e900f55a0d683118c095d6ef1b0dc689c07b25ec8a3cf95955bac45719e555f50c96e81b6b75901d56028310545b774117d33b45bdb5115b96a5373532280545e859dca0eb63581dcee6fc38886fa91bc4006659c8ae037c81c8f2ab1b711f2b5d08e6eb1ee76777a0dbcb97a883a65720ad8c44b97af44fe90f", 0xe5}, {&(0x7f0000000300)="6231a6b741929f30f318d841bff24783ec71cd3ab9a9a57c79c6c63210257da6ce368dc79b29d7ff218fe373", 0x2c}, {&(0x7f0000000340)="deeec81442c45de59dc6ba593884deef8df2f6a0d88da61ef5116b75c75c9970253a28db44ea2664dac4fdb98800bd492fac92ef0fda07774f991b299682a6ccd74c895da8625ce54e4634f0a05baa4c91b4214fd7e2781b77d538be070f2e9f8dc0120958cbc8f6efa82e455809700e982fce929a3ce931fc2d50ddfc072a841a22f09bdf639c752d8b0ea163ad1c2c2047158af1724c", 0x97}, {&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="379c9850261b80243b8604636758e1a8222a7e54d11f8b2ba74e93a70ff4c2689cc40ae02381e78a36cf2e1fe186bed039f053e6d7cae1d4be44f7612d83739de493a8e5d96529b07ae4c10f24b15df45d19d9fc9d567e1be9b29638d3a38ee2b2f03f54f8c2f71c348ff087504d30e2dd1a0dc8cccef14cd12840d6c43abb8c1436a27969f22e175fb0b083b78b1b143f8eab39417e1864bc61dd27", 0x9c}], 0x6, &(0x7f0000001580)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r2}}}], 0x28}, 0x20000800) exit(0xffffffffffffffff) 00:17:35 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x0, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:35 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCSCLOCKID(r3, 0x400445a0, &(0x7f0000000100)) r4 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000140)={0x80000000}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:36 executing program 0: clone(0x20010000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x264640, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000640)={0x3, 0x0, &(0x7f00000001c0)=""/236, &(0x7f00000002c0)=""/129, &(0x7f0000000380)=""/156, 0x100000}) perf_event_open(0x0, 0x0, 0x3, r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0xa9f9, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x70) exit(0xffffffffffffffff) getsockopt$inet6_int(r0, 0x29, 0x12, &(0x7f0000000140), &(0x7f0000000180)=0x4) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x10000, 0x0) 00:17:36 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:36 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x0, 0x0) ioctl$KVM_SET_XSAVE(r0, 0x5000aea5, &(0x7f0000001300)={"5e8f9e68dbfee33d77bd8b274ef524d251471a91f4f2ca5e886978cb207b8b223361f292c611e8c685cb7f0a9969b59dcbf527d7adb1143eda4b9225b01fd3dae494a35437ac81ba8d7149bb72a508d7cb6199a5e1be329a2cbb7055991d29531abfd1d4549211db25e5e0da9846401079ded06243163cb4ad94d3d6eca7172a94393c3ec45d0e7ff6d1ea0e1bd9adfcf9f16ea4a927351a5b9e245d2d26bfd58caf859179ee07f0b560012877aa1a2add4e105a5d5a90684365cb1dfe74eef992581813c6c97214ae518e3390057bc439bf748b47ec819c75db0dc889324a91d17980f9b5e2e71e37a7516d57d9a39ca658db299bb4017f854e3aa4f4a4768bbf584539c028b54482baf08c47581e284a6324760dc20fd68f782cdc1c2ae5fd314fb8ff519ee8ba98f48bf28868d5ef9afa9538fedf07ac037bd8f0e7c8e049c5c2143aa632cf072254f25f5acc47195495e64befb9a3eaa9caefa4528f5e4fcc7e14a2a45b2409008ad4541eb5f00d0c839326c0969ae2c2fa1e3babf43da9613d00f96fd007ef9fc74c0fd8f495913b6c933135a1a783d4989e7b7c10593d428656a48aa6ffdc218808b39b731275191f8d1536c39068798730d65a9726d8b01e566176b09f9556c6c89c89f366a3bf530430486195aedfdc376d95c64651ec82c3dffa07bab431be9f8a94abca336f939a10a6c08443e8da3e43aaa429cda6ebe8fdf28f296ef60fa8db7bb985bec71fa04fd8587bb0cc1bec17d43547919c64bf6eb18a4d2cb514b8c2004dc1426fd83396487ed454797a09bf4dd2cc9e228cc012c043f658f089b94151cdeed04cc7db0f92dd585e58af64927d6b83a6a8f3fdc24ad3f61aa734f23d997762b096e61009946ebaad727955f5cfa9d8246efe165937a95d20ad4204b8a46091089f8915aeab840fe13a32edfd2fabcf7a25dec1cbdeb65b34f41e53112085e8249fdc2c3863bc402b9792dda1d1c4c72d35ebf3e2a8489fb64d5a61c91c9ba7a0b681819978b2654d2a299cb444a01efaddfc92c98e56e08b80c9ea534643c340435b276d0630211653561bccb0538156e3f42513ffaeb03aa4ea03b6eec5ce061bb645465882f76dd3c12da75069b31717df3266184b6d29025a4f7d1d50fa805010f0075a3226c208c3dd42f54adf93bcefd1e979309d0bfbcae76199f06f72f6fdb55bc7c1c37ba62a2eaee5c859ae2892019b384722da18493bacea9c93ce0acc690b8459aa8692d4110e677f7594ff4fe561a87d2952a1fd6cdd5da499731e043714393f55619b8632ec8085aa57cab4c3bbe17b8b32362c9247c976c5230f0c29b18481a004ffe4c2a6a17ed4b4a3b37ed09487c641b66ce6fc57c1d1d3b1c811b379432a62b06c960dbd594409deb77af1697fa10514773974a9d9325966712dc76b35d9b4241e446764a08105"}) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x8000) sendto$rxrpc(r1, &(0x7f0000000300)="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", 0x1000, 0xab3c7cdf373af363, &(0x7f00000000c0)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e21, 0x5, @mcast2, 0x5}}, 0x24) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:36 executing program 1: r0 = epoll_create1(0x80000) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) syz_mount_image$nfs(&(0x7f00000000c0)='nfs\x00', &(0x7f0000000100)='./file0\x00', 0x5, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000140), 0x0, 0x9}, {&(0x7f0000000180)="25e890a5080382acaaee4e090a71af112af6af7b8b655aeea5508f8b3a75294591e9c077bbc16ac6330a4c88dd1ad35d553c25f0489b4d6230e33e8d7f7f5848662e", 0x42, 0x29c}, {&(0x7f0000000200)="a7c5608bf969bbfa9acb2a42f945e6b9f75ee23fbb3288519a58aa6a91cf492231109c693ee8da829a40aba748fb744b4539b6f01af5e67ed419eb7013d62fc8f0529323a1f4660fadcc8186e0b7b38b8a2940837bb61b91a63c9b4a4e5e1c206c0c5f08c1f690c9163e00074da6c76be2c28b699e5043f7fcf7278f2d38483b8f2c9345a5c487046610da8ebad892d215a5195a32aa89c13d0aae371682800cf9f456d20e87c6f9a6be6dd5", 0xac, 0x81}, {&(0x7f00000002c0)="9e823abc9fef988bd1f3f7458eb6ec7b1c9f8ac8db323c2b5ce9d6851233b73335db0a5e054050dbaa42ee5de46663b16c286cc4b37ed72afda7f59ea972910dca49f778ec0c4716e4c117b0d12d94aa1eaa45bbe3c00f2b949c41ec872fe9615eff68295453501d31158f82018d9cfde551d3f07cb48be7d3e280c6da78337aa10e16b03e68a3da731afc36e7474573004c8a560b1cadf6c20c594cfc977b406922c9024f198f3118f1c0aeda528d2dc264d37bcd8beb6524e34781ae56d88c7c318fd2a447fcda7e18a4af462ac1aa0490fd808c650f6adb5a76863aa54409eb49ac08427167a3", 0xe8, 0x7f}], 0x10000, &(0x7f0000000440)='\x00') prctl$PR_SET_THP_DISABLE(0x29, 0x0) 00:17:36 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(r4, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:36 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f00000000c0)={0x0, 0x75, "e6ef3ba03cd7a746475e2bb929c7253314527c3bc3b2483e906afd7a9da6b29b9959e010d98ace8343f9a1acbd5005ac461e86bd5d0d945b42e895345cc09a9938cd70a09157b1fda099871801997b8e2fad7409b249d763d4662b946eb41fad8790e5fb63bc952c9212d418d1e91f90190dc0b614"}, &(0x7f0000000140)=0x7d) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000180)={0x0, 0x800, 0x8, 0x401, 0x5, 0x5, 0xb2bb, 0x0, {0x0, @in6={{0xa, 0x4e21, 0x6, @loopback, 0x3}}, 0x101, 0xe7b, 0x2, 0x3, 0x8}}, &(0x7f0000000240)=0xb0) getsockopt$inet_sctp_SCTP_STATUS(r3, 0x84, 0xe, &(0x7f0000000280)={r4, 0x4, 0xffffffffffffff00, 0x3ff, 0x2, 0x5bf, 0x50000000000000, 0x9, {r5, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x1, 0x81, 0x1, 0xff, 0x1}}, &(0x7f0000000340)=0xb0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:37 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x0, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:37 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) get_thread_area(&(0x7f00000000c0)={0x96ae, 0x20001000, 0x400, 0x0, 0x3, 0xfff, 0x80, 0x2, 0x9, 0x1f}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:37 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r0 = syz_open_dev$sndtimer(&(0x7f0000000280)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2}}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000000)={{0x0, 0x2}}) exit(0xffffffffffffffff) 00:17:37 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_INTERVAL(r0, 0xc040564b, &(0x7f00000005c0)={0x8, 0x0, 0x2014, 0x7, 0x0, {0x2, 0x4}, 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x200440) ioctl$DRM_IOCTL_VERSION(r1, 0xc0406400, &(0x7f0000000200)={0x3, 0xfffffffffffffffa, 0x4080000000000, 0x5, &(0x7f00000001c0)=""/5, 0xe4, &(0x7f0000000300)=""/228, 0xa2, &(0x7f0000000400)=""/162}) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000004c0)={0xae7d606, {{0x2, 0x4e21, @multicast1}}}, 0x88) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:37 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@loopback, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x10, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1}, [@ldst={0x1, 0x2, 0x1, 0x8, 0x2, 0xfffffffffffffff8, 0x4}, @alu={0x4, 0xfffffffffffffffd, 0x8, 0x9, 0x9, 0x20, 0xffffffffffffffff}]}, &(0x7f00000000c0)='GPL\x00', 0x10001, 0x73, &(0x7f0000000140)=""/115, 0x41000, 0x4, [], r0, 0x10, r1, 0x8, &(0x7f0000000400)={0x3, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x0, 0x6, 0x45e6}, 0x10}, 0x70) syz_genetlink_get_family_id$tipc2(0x0) 00:17:37 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000140)={0xffffffffffffffff}, 0x2, 0xc4c180e2c975940}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000100), 0x3, {0xa, 0x4e21, 0x80000001, @loopback, 0x49}, r1}}, 0x38) r2 = syz_open_dev$vcsn(&(0x7f00000000c0)='/dev/vcs#\x00', 0x3, 0x3) ioctl$SIOCAX25GETINFO(r0, 0x89ed, &(0x7f0000000340)) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x4) r3 = epoll_create1(0x0) openat$selinux_create(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/create\x00', 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup3(r4, r5, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r6, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x4, 0x0, 0x8, 0x2}, &(0x7f0000000400)=0x18) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000440)={r7, 0x40}, 0x8) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r3, &(0x7f0000000040)) write$P9_RREAD(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="880000007502007d000000ae0a38202504114b004524acab45031bd9703419f33bf2f2f14760959db05b39fd469219fa6b10176ef4c221a3835c9f1c8a0f6cb188a524f7de113af6cf5db15cbd5b2988c98d0cb7a5c945465454fe21130a5f0d07a77298335f30af843ceb5a647334e9dcf209cd7a7cf07a2c30b6d45e60c60d5289a9654e0bd90b7a667b112f2d28ff8cfb77a999ad09cf480ad7dc290db7437a0ca963397ae792a45538f9aefccf4d75534e749869e8c0de0f113c7858681202b80bcb2bd72d7050fd6603000000508b1d7070a80f55e57ffaa01590d098acbe"], 0x88) 00:17:37 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x0, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:38 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x2, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x3) 00:17:38 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:38 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) accept$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) bind(r2, &(0x7f00000001c0)=@hci={0x1f, r4, 0x1}, 0x80) sendto$unix(r3, &(0x7f0000000280), 0x0, 0x40, &(0x7f00000002c0)=@abs={0x1, 0x0, 0x4e20}, 0x6e) getsockopt$ARPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x63, &(0x7f0000008380)={'icmp\x00'}, &(0x7f000000ac80)=0x1e) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r3, 0x4010ae68, &(0x7f0000000240)={0x3002, 0x1f000}) ioctl$sock_rose_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4ac, @default, @netrom={'nr', 0x0}, 0x4, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @default, @bcast, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}) renameat2(r3, &(0x7f0000000280)='./file0\x00', r3, &(0x7f0000000340)='./file0\x00', 0x1) clock_gettime(0x0, &(0x7f000000ac00)={0x0, 0x0}) recvmmsg(r2, &(0x7f000000a980)=[{{&(0x7f0000000380)=@x25={0x9, @remote}, 0x80, &(0x7f0000001680)=[{&(0x7f0000000400)=""/242, 0xf2}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/168, 0xa8}, {&(0x7f00000015c0)=""/137, 0x89}], 0x4, &(0x7f00000016c0)=""/124, 0x7c}, 0x1}, {{&(0x7f0000001740), 0x80, &(0x7f0000001a00)=[{&(0x7f00000017c0)=""/83, 0x53}, {&(0x7f0000001840)=""/178, 0xb2}, {&(0x7f0000001900)=""/167, 0xa7}, {&(0x7f00000019c0)=""/55, 0x37}], 0x4}, 0x407}, {{&(0x7f0000001a40)=@ethernet={0x0, @broadcast}, 0x80, &(0x7f0000002cc0)=[{&(0x7f0000001ac0)=""/11, 0xb}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000002b00)=""/68, 0x44}, {&(0x7f0000002b80)=""/120, 0x78}, {&(0x7f0000002c00)=""/91, 0x5b}, {&(0x7f0000002c80)=""/14, 0xe}], 0x6, &(0x7f0000002d40)=""/1, 0x1}, 0x101}, {{&(0x7f0000002d80)=@nfc_llcp, 0x80, &(0x7f0000005040)=[{&(0x7f0000002e00)=""/11, 0xb}, {&(0x7f0000002e40)=""/252, 0xfc}, {&(0x7f0000002f40)=""/4096, 0x1000}, {&(0x7f0000003f40)=""/4096, 0x1000}, {&(0x7f0000004f40)=""/84, 0x54}, {&(0x7f0000004fc0)=""/38, 0x26}, {&(0x7f0000005000)=""/57, 0x39}], 0x7, &(0x7f00000050c0)=""/131, 0x83}, 0x8001}, {{&(0x7f0000005180)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}}, 0x80, &(0x7f0000005600)=[{&(0x7f0000005200)=""/167, 0xa7}, {&(0x7f00000052c0)=""/241, 0xf1}, {&(0x7f00000053c0)=""/240, 0xf0}, {&(0x7f00000054c0)=""/12, 0xc}, {&(0x7f0000005500)=""/228, 0xe4}], 0x5}, 0x3}, {{&(0x7f0000005680)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f00000057c0)=[{&(0x7f0000005700)=""/141, 0x8d}], 0x1, &(0x7f0000005800)=""/4096, 0x1000}, 0x20}, {{&(0x7f0000006800)=@ax25={{0x3, @default}, [@rose, @remote, @bcast, @bcast, @netrom, @remote, @default, @netrom]}, 0x80, &(0x7f0000006b40)=[{&(0x7f0000006880)=""/195, 0xc3}, {&(0x7f0000006980)=""/230, 0xe6}, {&(0x7f0000006a80)=""/78, 0x4e}, {&(0x7f0000006b00)=""/49, 0x31}], 0x4}, 0x4}, {{0x0, 0x0, &(0x7f0000007f80)=[{&(0x7f0000006b80)=""/187, 0xbb}, {&(0x7f0000006c40)=""/226, 0xe2}, {&(0x7f0000006d40)=""/246, 0xf6}, {&(0x7f0000006e40)=""/4096, 0x1000}, {&(0x7f0000007e40)=""/212, 0xd4}, {&(0x7f0000007f40)=""/10, 0xa}], 0x6, &(0x7f0000008000)=""/246, 0xf6}, 0x80000000}, {{&(0x7f0000008100)=@generic, 0x80, &(0x7f000000a540)=[{&(0x7f0000008180)=""/139, 0x8b}, {&(0x7f0000008240)=""/46, 0x2e}, {&(0x7f0000008280)=""/251, 0xfb}, {&(0x7f0000008380)}, {&(0x7f00000083c0)=""/4096, 0x1000}, {&(0x7f00000093c0)=""/125, 0x7d}, {&(0x7f0000009440)=""/228, 0xe4}, {&(0x7f0000009540)=""/4096, 0x1000}], 0x8, &(0x7f000000a5c0)=""/224, 0xe0}, 0x100}, {{&(0x7f000000a6c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f000000a840)=[{&(0x7f000000a740)=""/233, 0xe9}], 0x1, &(0x7f000000a880)=""/240, 0xf0}, 0x7}], 0xa, 0x120, &(0x7f000000ac40)={r5, r6+10000000}) [ 644.242832] kauditd_printk_skb: 405 callbacks suppressed [ 644.242840] audit: type=1400 audit(1566087458.608:25579): avc: denied { map } for pid=23249 comm="blkid" path="/sbin/blkid" dev="sda1" ino=16128 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:38 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xfffeffeffbffffbf) syz_genetlink_get_family_id$tipc2(0x0) 00:17:38 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@empty}}, &(0x7f0000000300)=0xbf) r2 = fcntl$dupfd(r0, 0x406, r0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, [], r1, 0x0, r3, 0x8, &(0x7f0000000040)={0x0, 0x2}, 0x8, 0x10, &(0x7f0000000000)={0x0, 0xfffffffffffffffe}, 0x10d}, 0x70) exit(0xffffffffffffffff) ioctl$VIDIOC_G_AUDIO(r2, 0x80345621, &(0x7f0000000080)) [ 644.450173] audit: type=1400 audit(1566087458.608:25580): avc: denied { map } for pid=23249 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:38 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) flistxattr(r3, &(0x7f0000000080)=""/178, 0xb2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)={0x20000000}) 00:17:39 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="61124c0000000000611350000000000000003d00000000000069260000002edf7cd1000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700042d35dcdefd036f0000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000000000000000000000000000000000000000f61ea6c4559939dae4e19abe0fb24d1d6e160dcf73857b9c4739f1215c1d032f6b9bb3bd133e4e3439ba0b62b5a52fe540d2c822495cd663d8a4b5253b6e4e62e492f36526767961dc370274682078535838283c0b7dc76aced3782f65ec4dc420e2f3d2626f5331a4d57cfdda7b07f1fe866953b2a477466485249dddf9f5b55400a60b906e5c454377cf"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x8, 0x42000) ioctl$DRM_IOCTL_MODE_GETPLANERESOURCES(r0, 0xc01064b5, &(0x7f0000000180)={&(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0], 0x4}) ioctl$VIDIOC_S_AUDIO(r0, 0x40345622, &(0x7f00000000c0)={0xfff, "2ae25e037bb8f656131b829e00ff2ffa2461ddfa4945827e60dcb27e4123d196", 0x3, 0xb14a05f5b219d8b}) [ 644.734041] audit: type=1400 audit(1566087458.608:25581): avc: denied { map } for pid=23249 comm="blkid" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 644.939355] audit: type=1400 audit(1566087458.648:25582): avc: denied { map } for pid=23249 comm="blkid" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:39 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x0, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:39 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61124800000000006113509000000000bf2000000000000007000000080000003d03010000000000950000000000000069260028bc7a0b9e000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) [ 645.109252] audit: type=1400 audit(1566087458.658:25583): avc: denied { read } for pid=23236 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:39 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0xc0000012}) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r3, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0x7c, "7b5ec438fef7f980f26738605c16d718e3525458f2f41065f5a3a6d30e3e4a6fb039b454788aeaa253445a3fdec6a8cd7494f020cbda058381a33d0543f986f33591be22bdb5b3ea30553d1fa789775bf91b3fdd93dcacf457d6f27f2a41b1c76fa0b37cf9e86dc10b70c26c21c70b06df4fd984c6f5ff4173383dce"}, &(0x7f0000000200)=0x84) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000240)={r4, 0xfff, 0x1, [0x0]}, 0xa) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f00000003c0)=0xe8) fsetxattr$security_capability(r1, &(0x7f0000000280)='security.capability\x00', &(0x7f0000000400)=@v3={0x3000000, [{0x6, 0x4000000000000000}, {0x0, 0x7fffffff}], r5}, 0x18, 0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) getsockopt(r1, 0x6, 0x80000001, &(0x7f0000000440)=""/182, &(0x7f0000000500)=0xb6) epoll_pwait(r0, &(0x7f00000000c0)=[{}, {}, {}], 0x3, 0x1, &(0x7f0000000100)={0xffffffffffffff28}, 0x8) ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000540)=""/113) 00:17:39 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r1 = syz_open_dev$radio(&(0x7f0000000340)='/dev/radio#\x00', 0x3, 0x2) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000380)={0x4, [0x2, 0x9, 0x9, 0x81]}, 0xc) exit(0x3) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x800, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000600)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8200}, 0xc, &(0x7f00000005c0)={&(0x7f0000000480)={0x108, r3, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7fffffff}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffffffffffe}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x74, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa4b}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8bcc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffffffff9038}]}]}]}, 0x108}, 0x1, 0x0, 0x0, 0x20000001}, 0x20000800) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x210100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r3, 0x20, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x20}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7d56}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20008004}, 0x4000000) ioctl$PPPIOCSMRU(r2, 0x40047452, &(0x7f0000000300)=0x6) fcntl$getownex(r0, 0x10, &(0x7f00000003c0)={0x0, 0x0}) syz_open_dev$usbmon(&(0x7f0000000640)='/dev/usbmon#\x00', 0x4, 0x41a000) write$FUSE_LK(r1, &(0x7f0000000400)={0x28, 0xfffffffffffffffe, 0x6, {{0x6, 0x7fffffff, 0x0, r4}}}, 0x28) [ 645.240244] audit: type=1400 audit(1566087458.698:25584): avc: denied { map } for pid=23249 comm="blkid" path="/lib/x86_64-linux-gnu/libblkid.so.1.1.0" dev="sda1" ino=2825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:39 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000300)='/dev/audio\x00', 0x200, 0x0) ioctl$TCGETX(r2, 0x5432, &(0x7f0000000340)) r3 = dup(0xffffffffffffffff) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000140)={&(0x7f00000003c0)='./bus\x00', 0x0, 0x18}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 645.308139] audit: audit_backlog=65 > audit_backlog_limit=64 [ 645.324134] audit: audit_backlog=65 > audit_backlog_limit=64 [ 645.383420] audit: audit_lost=635 audit_rate_limit=0 audit_backlog_limit=64 [ 645.393234] audit: audit_backlog=65 > audit_backlog_limit=64 00:17:39 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) write$selinux_context(r0, &(0x7f0000000140)='system_u:object_r:dhcpd_exec_t:s0\x00', 0x22) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r2 = dup2(r1, r1) ioctl$KDGKBLED(r2, 0x4b64, &(0x7f0000000080)) exit(0xffffffffffffffff) 00:17:39 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, r0, 0x8, &(0x7f0000000040), 0x1f1}, 0xe) shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000140)={0x990000, 0xb2e, 0x1, [], &(0x7f00000000c0)={0x990a30, 0x7, [], @string=&(0x7f0000000080)=0xfffffffffffffffd}}) r1 = open(&(0x7f0000000180)='./file0\x00', 0x800, 0x80) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0, 0x400}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000300)={r2, 0x9, 0x3, [0x9, 0xee17, 0x3f]}, &(0x7f0000000340)=0xe) 00:17:40 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f00000000c0)) 00:17:40 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x0, 0xf}, 0x9}, 0x70) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/route\x00') setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x15, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000300)={0x6, 0x118, 0xfa00, {{0x0, 0x2, "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", 0x89, 0xfff, 0xffffffffffffff15, 0x7f, 0xa28, 0x7, 0x6, 0x1}, r1}}, 0x120) 00:17:40 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee66c514a7abe3899f100001f65000000000000650700000269bf1436ace400070700004c00000065ef000000000000bf54000000000000150400000400f9ffad4301000000c0c2f930eda6553d6a7277b3e7c8344000009500000000000000050000000000000095000000000000000000c0c989ce7988fea22b6b473c6fac8ac7a0565a83553d80f33870a35e9461d7ebdd7c728e959f7c57916c0f66883f26f46cf71dd421b1a4733b8a27293e9d9e637fb1c72100cc55dc7c13d671e13a501de0edbf7cff124a8db7b3ade09e355692ee6ed584cd1b2c5a44665c2eefba353e1c8cc2082987f420161c963c764812cb18a8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:17:40 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x0, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:40 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@ipv4={[], [], @empty}, 0x7ff, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:40 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) r3 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x0, 0x40) ioctl$KVM_CHECK_EXTENSION(r3, 0xae03, 0x7) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:41 executing program 1: r0 = epoll_create1(0x80000) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x8080, 0x0) ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r1, 0xc0305616, &(0x7f0000000180)={0x0, {0x8, 0x12}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup3(r2, r3, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) ioctl$RTC_EPOCH_SET(r5, 0x4008700e, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount(&(0x7f0000000040)=@nullb='[d::],0::0:\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='ceph\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) ioctl$DRM_IOCTL_ADD_CTX(r4, 0xc0086420, &(0x7f00000001c0)={0x0}) ioctl$DRM_IOCTL_UNLOCK(r4, 0x4008642b, &(0x7f0000000200)={r6, 0x20}) 00:17:41 executing program 3: clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x3f}, 0x10}, 0x70) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x5, 0x200) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000140)={0x3, "15e7d5a2cb734eebceacbf8397e7cb72e4a292d54fe5548e3f868d4df4942a86", 0x0, 0x20, 0x2, 0x7, 0x10, 0x2, 0x1000, 0x5}) 00:17:41 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) fcntl$setflags(r0, 0x2, 0x0) 00:17:41 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:41 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x2c0000, 0x0) ioctl$PPPIOCSDEBUG(r0, 0x40047440, &(0x7f00000000c0)=0x6) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03010000000000950000000000000069260004fc420b000000000000000000150600000fff070035060000020ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad4301000000000095000000000000000500000000000000950000000000000000002000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) eventfd2(0x7fffffff, 0xdfb983870bdb75cd) [ 647.560343] libceph: mon1 [::1]:6789 socket error on write [ 647.567676] libceph: mon1 [::1]:6789 socket error on write 00:17:42 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x4000, 0x0) accept4$nfc_llcp(r0, 0x0, &(0x7f00000000c0), 0x80000) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:42 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) r0 = socket$key(0xf, 0x3, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r4 = dup(r3) fsetxattr$trusted_overlay_nlink(r1, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r4, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, 0x0, 0x0) r5 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r4, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r5, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r2, 0x8004745a, 0x0) ftruncate(r5, 0x2007fff) sendfile(r4, r5, 0x0, 0x8000ffeffffe) 00:17:42 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) [ 648.011177] libceph: mon1 [::1]:6789 socket closed (con state CONNECTING) 00:17:42 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f00000000c0)={0x0, 0x3ff, 0x3, [0x6, 0x7, 0x40]}, &(0x7f0000000100)=0xe) signalfd4(r0, &(0x7f0000000180)={0x80000001}, 0x8, 0x80800) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000140)={r4, 0x1, 0x2, [0x4, 0x800]}, 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) [ 648.261744] libceph: mon1 [::1]:6789 socket closed (con state CONNECTING) 00:17:42 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:42 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:42 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x434100, 0x0) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf670000000000001506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c000000000000150400000400f9ffad43010000000000950000000000000005007acc3229f63b395900"/163], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f00000000c0)=0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f0000000140)={0x1, 'nr0\x00', 0x1}, 0x18) ioctl$MON_IOCQ_URB_LEN(r0, 0x9201) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:43 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_ctr_aes192\x00'}, 0x58) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={r4, 0x28, &(0x7f0000000140)}, 0x10) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, 0x0, 0xfffffffffffffdfe) r5 = accept$alg(r4, 0x0, 0x0) recvmmsg(r5, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) r6 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) getpeername$inet6(r6, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000100)=0x1c) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f00000001c0)={0x2, 'gre0\x00', 0xff}, 0x18) 00:17:43 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) signalfd4(r0, &(0x7f0000000140)={0x9}, 0x8, 0x80800) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_dev$vivid(&(0x7f0000000080)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f00000000c0)) 00:17:43 executing program 0: r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffffe, 0x408000) sendmsg$key(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="02140607060000002cbd7000fcdbca25020013000400000026bd700002f1ded6fe01d366ea1c5ed1f041c63500000200"], 0x2de}}, 0x48080) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x24) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000440)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d03016926000000000000bf6700000000000015060c003506000002000000070600000ee60000bffb0000000000001f6500000000000000070700004c0000001f75000000000000bf54000080000000150400000400f9ffad43010000000000950000000000e81ae505000000000000950000000000eca36a2ec60fa93e7700547158e18ad9d499c889868ec66a54f422361bbc977c6b760bd5668d5559f2fd03109c009363c3526bb895e95b6204d428935ee8bcd215a2706c84b9f79110ff7aef33d8d066e418b7a5d46a9fedd7ffa80db1d7"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) exit(0xffffffffffffffff) bind$bt_rfcomm(r0, &(0x7f0000000140)={0x1f, {0x8001, 0x7, 0xfff, 0x200, 0xf1, 0x8}, 0x3}, 0xa) 00:17:43 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) ioctl$FICLONERANGE(r3, 0x4020940d, &(0x7f00000000c0)={r1, 0x0, 0x4, 0x0, 0x20}) [ 649.252694] kauditd_printk_skb: 395 callbacks suppressed [ 649.252702] audit: type=1400 audit(1566087463.618:25963): avc: denied { write } for pid=23407 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:43 executing program 3: clone(0xd37da11df40b92dd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x3, 0x70, 0xa9, 0x4, 0x7f, 0x7ff, 0x0, 0x20, 0x50005, 0x1, 0x0, 0x8, 0x9, 0x85c5, 0x80, 0x1000, 0x5, 0x6, 0x8, 0x7, 0xfec7, 0x3, 0x4, 0x1, 0x5c9, 0x100000001, 0x0, 0x2, 0x1f, 0x800, 0x1000, 0xa4, 0x8, 0xdb5, 0x6, 0x81, 0x3, 0x8, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000080), 0x4}, 0x2, 0x5, 0x0, 0x3, 0x1, 0x0, 0x8}, r0, 0xd, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000300)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080a7b5b5963dd8e65115dfac13e0000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf540000000000001d0400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0x0) syz_genetlink_get_family_id$tipc2(0x0) 00:17:43 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x80000008, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 649.541728] audit: type=1400 audit(1566087463.618:25964): avc: denied { map } for pid=23453 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:44 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x800, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x3c3) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x141000, 0x0) ioctl$RTC_IRQP_READ(r3, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000002800)=""/4096, 0xff6e, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 649.716789] audit: type=1400 audit(1566087463.618:25965): avc: denied { map } for pid=23453 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:44 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000f16407000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:17:44 executing program 1: r0 = epoll_create1(0x80000) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$VIDIOC_QUERYMENU(r1, 0xc02c5625, &(0x7f0000000100)={0xfff, 0x0, @name="154331c48df27ed187fc59e012d815f06f718af6e0d4e5f472b0d73ceebf3c92"}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r2, r3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r3, &(0x7f0000000040)) [ 649.874664] audit: type=1400 audit(1566087463.618:25966): avc: denied { map } for pid=23453 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 650.023967] audit: type=1400 audit(1566087463.618:25967): avc: denied { map } for pid=23453 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 650.132400] audit: audit_backlog=66 > audit_backlog_limit=64 [ 650.135858] audit: audit_backlog=66 > audit_backlog_limit=64 [ 650.149777] audit: audit_backlog=66 > audit_backlog_limit=64 [ 650.168059] audit: type=1400 audit(1566087463.658:25968): avc: denied { map } for pid=23456 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 650.175045] audit: audit_lost=642 audit_rate_limit=0 audit_backlog_limit=64 00:17:44 executing program 1: r0 = epoll_create1(0x799cbdc2d9173fea) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000000040)={0x2}) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)) 00:17:44 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4400, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000140)={{{@in=@broadcast, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@multicast2}}, &(0x7f00000000c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r0, &(0x7f00000003c0)={0xa0, 0x19, 0x1, {0x400, {0x70, 0x4, 0x5}, 0x1, r1, r2, 0x5, 0xbf, 0x9, 0x2, 0x7, 0x400, 0x0, 0x21, 0xfffffffffffffff8, 0x1, 0xffffffffffffff3e, 0x80, 0x8001, 0x8d5, 0x4b}}, 0xa0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:17:45 executing program 5: clone(0x40000400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0xf4, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:45 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:45 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:45 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000140)={0x0, 0xf1, "0f8cedda7d145e64461c11f22c14c90c51dca93c7e3e3aae77c9b8328f1f91bd650297f3b30c2cfa4c20e6922c28eba605d8f4a4b663cb665b4eceffa2bc94485118a6552a6de1897d0dd16a5a4c06d533905f472fd8dba2fda0bd00f189cba994cbd92d2d8958c0e700faff885e58fa35a34fa17e3c80726186cd7e4fce4ef5dcc9c4ac74a7b1c850e3512ba8913c22d35828a7488505cf62e1ed8d49680d7ed561d2e6d1fdbe4a347be5b9a9a1c9f9a168283df0e28db5722312736234aa0eae6ad61a083ddf3e13f5f696de4e034cc9e30d664667be9fab7ed52ed06e3893395865f242f6f5c9befb6293e8d8dce135"}, &(0x7f00000000c0)=0xf9) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000300)={r1, 0x2}, 0xc) exit(0xffffffffffffffff) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000340)={0x8e, 0xd32, 0x1, 0x4, 0x3, 0x91b7, 0x20, 0x850, 0x5, 0xfff}) 00:17:45 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) write$P9_RREAD(r3, &(0x7f00000000c0)={0xe2, 0x75, 0x1, {0xd7, "1b96e6a25c5cf501cc44f9934172478a72333e5cc360d26c33980c9fb07116c5ae5596470ec589bf1d364a576a794ae873eb8b6a7fd889734a9406f25a713f695d3e9b6761289f55fd1150a6da83ef96727293113dfee740715889abefb5e7266ec48f90d7997b874a17230cbdc112987f726a51fcca699d4b9ccbdfc3c95ae6c0682884e7890339257653ec0966b9d05b8bac98f61257e47483ab8ba579233ab94ece9cc1b3ee876d377f740f2f8a86b40eac4a8cb53c7cb17f120ed16b14db46e1a74b4170fa6a7493f3a00721d7f827cedecfafa1fa"}}, 0xe2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:45 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00020100000000, 0x81, 0x80010001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x4) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d86, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) [ 651.260709] IPVS: ftp: loaded support on port[0] = 21 00:17:45 executing program 0: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rfkill\x00', 0x67bae945f15bb0e4, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000400)='trusted.overlay.upper\x00', &(0x7f0000000440)={0x0, 0xfb, 0x3a, 0x4, 0x9, "ffc884f5df494ff32ed96d3171d28653", "88627496ab1b2bdf3f409a3c9e06cb59fc6ac98829bcd66c01ecb7d26de3f41bbfc74052b1"}, 0x189, 0x1) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400202, 0x0) recvfrom(r1, &(0x7f0000000300)=""/242, 0xf2, 0x40, 0x0, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r1, 0x5381) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000140)=""/200) exit(0xffffffffffffffff) 00:17:45 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$9p(&(0x7f00000000c0), 0x33b2be4c4fbe9de1) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:46 executing program 3: clone(0x20000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffff) syz_genetlink_get_family_id$tipc2(0x0) [ 651.984543] IPVS: ftp: loaded support on port[0] = 21 00:17:46 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) sched_getscheduler(r4) 00:17:46 executing program 0: clone(0x18308200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x3, 0x40001) setsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f00000000c0)=@dstopts={0x3c, 0x0, [], [@jumbo={0xc2, 0x4, 0x1}]}, 0x10) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000140)={0x1000, 0x9, 0x4, 0x2000000, {0x0, 0x7530}, {0x3, 0x2, 0x1, 0x5, 0xffffffff, 0x20, "2e97ab0c"}, 0x8, 0x3, @offset=0x80000001, 0x4}) 00:17:46 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:46 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/mcfilter6\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x4, 0x984, 0x80000001, 0x0, 0xf}) 00:17:47 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) socket$can_bcm(0x1d, 0x2, 0x2) 00:17:47 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000300)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x2) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0xffffff84, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x3ab) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x200, 0x0) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, 0x0) ftruncate(r0, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:47 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0xc058534b, &(0x7f00000000c0)={0x8, 0x0, 0x2f8f, 0x5, 0x6, 0x4}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:47 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x400, 0x0) r2 = dup(r1) r3 = syz_genetlink_get_family_id$fou(&(0x7f0000000180)='fou\x00') clock_gettime(0x0, &(0x7f0000004cc0)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000008c0)=""/221, 0xdd}, {&(0x7f00000009c0)=""/174, 0xae}, {&(0x7f0000000a80)=""/182, 0xb6}], 0x3, &(0x7f0000000b80)=""/191, 0xbf}, 0x1ff}, {{&(0x7f0000000c40)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000cc0)=""/152, 0x98}], 0x1, &(0x7f0000000dc0)=""/132, 0x84}, 0x3}, {{&(0x7f0000000e80)=@un=@abs, 0x80, &(0x7f0000001080)=[{&(0x7f0000000f00)=""/208, 0xd0}, {&(0x7f0000001000)=""/65, 0x41}], 0x2, &(0x7f00000010c0)=""/26, 0x1a}, 0x6a7}, {{&(0x7f0000001100)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000002500)=[{&(0x7f0000001180)=""/166, 0xa6}, {&(0x7f0000001240)=""/146, 0x92}, {&(0x7f0000001300)=""/165, 0xa5}, {&(0x7f00000013c0)=""/4096, 0x1000}, {&(0x7f00000023c0)=""/102, 0x66}, {&(0x7f0000002440)=""/190, 0xbe}], 0x6, &(0x7f0000002580)=""/34, 0x22}, 0x9}, {{0x0, 0x0, &(0x7f0000003640)=[{&(0x7f00000025c0)=""/4096, 0x1000}, {&(0x7f00000035c0)=""/104, 0x68}], 0x2}, 0x8001}, {{&(0x7f0000003680)=@isdn, 0x80, &(0x7f0000004ac0)=[{&(0x7f0000003700)=""/96, 0x60}, {&(0x7f0000003780)=""/10, 0xa}, {&(0x7f00000037c0)=""/87, 0x57}, {&(0x7f0000003840)=""/4096, 0x1000}, {&(0x7f0000004840)=""/210, 0xd2}, {&(0x7f0000004940)=""/157, 0x9d}, {&(0x7f0000004a00)=""/192, 0xc0}, {&(0x7f0000005540)=""/4096, 0x1000}], 0x8}}], 0x6, 0x12101, &(0x7f0000004d00)={r4, r5+30000000}) sendmsg$FOU_CMD_DEL(r2, &(0x7f0000004e00)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x500}, 0xc, &(0x7f0000004dc0)={&(0x7f0000004d40)={0x4c, r3, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_IFINDEX={0x8, 0xb, r6}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e21}, @FOU_ATTR_LOCAL_V6={0x14, 0x7, @ipv4={[], [], @local}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0xe05c7bddbf7a4e36) signalfd(r0, &(0x7f00000000c0)={0xfff}, 0x8) lstat(0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000440)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:47 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) 00:17:47 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x5, 0x0, [{0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:47 executing program 0: clone(0x10000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) 00:17:48 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RCLUNK(r3, &(0x7f0000000180)={0x7, 0x79, 0x1}, 0x7) r4 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r4, 0x0, 0x1}, 0x14) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, &(0x7f00000000c0), 0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:48 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) 00:17:48 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f00000000c0)={0x1, 0x401, 0x3ff, 0x3}) syz_genetlink_get_family_id$tipc2(0x0) [ 654.265778] kauditd_printk_skb: 440 callbacks suppressed [ 654.265785] audit: type=1400 audit(1566087468.628:26377): avc: denied { map } for pid=23632 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:48 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'L+', 0x400000000006}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(0xffffffffffffffff, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x0, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x100) sendfile(r2, r4, 0x0, 0x8000ffeffffe) 00:17:48 executing program 1: r0 = epoll_create1(0x80000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) ioctl$VIDIOC_QUERYSTD(r3, 0x8008563f, &(0x7f0000000840)=0x0) ioctl$VIDIOC_S_STD(r3, 0x40085618, &(0x7f0000000880)=r4) r5 = gettid() stat(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000500)='./file1\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r8 = getpid() stat(&(0x7f00000005c0)='./file1\x00', &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000680)=0x0, &(0x7f00000006c0), &(0x7f0000000700)) sendmsg$unix(r3, &(0x7f0000000800)={&(0x7f0000000300)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000380)="f009456ac9a2216d4ba7efbec8916f769240425d9e17556568ef2d263a7638959e8a60996a60c5be6c1da2690555aa1fa08ff870d11a2facecd57afba893cb5af66cbda13fa4e4758ba3a92b12ae85789c7d06c86d4f179bdde6806b28db079d74583850128d", 0x66}], 0x1, &(0x7f0000000740)=[@cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}, @rights={{0x30, 0x1, 0x1, [r1, r3, r2, r0, r3, r3, r1, r1]}}, @cred={{0x1c, 0x1, 0x2, {r8, r9, r10}}}, @rights={{0x30, 0x1, 0x1, [r0, r2, r0, r3, r1, r3, r3, r1]}}, @rights={{0x1c, 0x1, 0x1, [r2, r3, r0]}}], 0xc0, 0x20000000}, 0x4800) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x15, &(0x7f00000002c0)={0x3a}, 0x1) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f00000000c0)=""/195, &(0x7f00000001c0)=0xc3) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) lsetxattr$security_smack_transmute(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000280)='TRUE', 0x4, 0x2) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:48 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x0, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 654.447645] audit: type=1400 audit(1566087468.668:26378): avc: denied { map } for pid=23632 comm="modprobe" path="/bin/kmod" dev="sda1" ino=1440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:48 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) accept(0xffffffffffffffff, &(0x7f0000000080)=@nfc_llcp, &(0x7f0000000140)=0x80) socketpair(0x10, 0xa, 0x1, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x402, 0x0) sendmsg$TIPC_NL_NAME_TABLE_GET(r2, 0x0, 0x24000840) recvmmsg(r2, &(0x7f0000004f00)=[{{&(0x7f0000001600)=@ethernet={0x0, @link_local}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000001680)=""/36, 0x24}], 0x1, &(0x7f0000001700)=""/174, 0xae}, 0x100}, {{&(0x7f00000017c0)=@nfc, 0x80, &(0x7f0000001880)=[{&(0x7f0000001840)}], 0x1, &(0x7f00000018c0)=""/4096, 0x1000}, 0x10000}, {{&(0x7f00000028c0)=@can={0x1d, 0x0}, 0x80, &(0x7f0000004dc0)=[{&(0x7f0000002940)=""/4096, 0x1000}, {&(0x7f0000003940)=""/94, 0x5e}, {&(0x7f00000039c0)=""/161, 0xa1}, {&(0x7f0000003a80)=""/133, 0x85}, {&(0x7f0000003b40)=""/185, 0xb9}, {&(0x7f0000003c00)=""/116, 0x74}, {&(0x7f0000003c80)=""/4096, 0x1000}, {&(0x7f0000004c80)=""/104, 0x68}, {&(0x7f0000004d00)=""/130, 0x82}], 0x9, &(0x7f0000004e80)=""/95, 0x5f}, 0x3f}], 0x3, 0x2000, &(0x7f0000004fc0)={0x77359400}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000005ac0)={'bridge0\x00', 0x0}) sendmmsg$inet6(r1, &(0x7f0000005dc0)=[{{0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000300)="1f7533f7f09ec8f253f3b51198a2be0f8dc7a1d07c79d5b979b7430918205e75c19a0100736b7d71e68315582d57e7e38dc7ef57dac9e08aaa250870f55b9fcec2c75a51b26c1f124cfa893e45d0b8dfda2edf3d49a52539c2f36ddd47f23a00ef4822f41c11a660ef34a51acd7b20de00e966128722d159e289b8d62b32ea44baba7b3155d9d5", 0x87}, {&(0x7f00000003c0)="272722a067bd54b55dac16a1badf5c3538fe61360caa0ca5b87625631110954fbb4a81911d40c69a89ccee7d6086a0c1eeb0f72074641950a00dfae8db1f453b0b99b9891478ec351a0d1fea69b183d9beeaf13bade648b5c05df80c04a01db56ad0cd0ae805749229ea89c738e7620c833ea16aab2f07b510ed2c1086dc90332c8d229a9937", 0x86}, {&(0x7f0000000480)="6e7442166d2831586a66fabc535a6caebe9bf5f7b9d09487ac12546c193df4cb186db6a821e376b270c19a1a9a662494db2e3b247e302df3e000eea7a7131cf5e458c9aa83fc591034e2b1a3fbfae2474dfb", 0x52}, {&(0x7f0000000500)="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", 0x1000}], 0x4, &(0x7f0000005000)=[@rthdrdstopts={{0x60, 0x29, 0x37, {0x0, 0x8, [], [@enc_lim={0x4, 0x1, 0x9}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x7}, @calipso={0x7, 0x20, {0x6, 0x6, 0x7, 0xff, [0x2, 0x6, 0xff]}}, @pad1, @padn={0x1, 0x1, [0x0]}, @jumbo={0xc2, 0x4, 0xfd8}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@local, r3}}}, @hopopts_2292={{0xf0, 0x29, 0x36, {0x3c, 0x1b, [], [@generic={0x5, 0x3e, "f5098088b6e2bd0f1a68bb13c23cd6c388722ea83d65656fd946d696bb11db2506a1e7e01398893ca5e2be35e52bb7ee11a3155c54092dcfebaccb3b3579"}, @padn={0x1, 0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x80}, @pad1, @calipso={0x7, 0x20, {0x100, 0x6, 0x9, 0x9, [0x2, 0xd, 0x8]}}, @calipso={0x7, 0x58, {0x9, 0x14, 0x2, 0x80000001, [0x2, 0x2, 0x0, 0x6, 0x7, 0x6000000000, 0x200, 0xffff, 0x2, 0x0]}}, @padn={0x1, 0xa, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}}}, @dstopts_2292={{0xa0, 0x29, 0x4, {0x3b, 0x10, [], [@generic={0x6, 0x50, "e062f8b1020c0d51345812c608580a90c870072d51e6c20e93d7e5ea934956adb52b741054f5a4c41ea113c823f20b651789b8519c4fe220346794c41b4cf0f2a03e4fcf281cbbef2ee93f981a21fd52"}, @jumbo={0xc2, 0x4, 0x3ff}, @calipso={0x7, 0x18, {0x3, 0x4, 0x200, 0x0, [0x397, 0x2]}}, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @pad1, @ra={0x5, 0x2, 0x3abfa4bf}, @enc_lim={0x4, 0x1, 0x16}]}}}, @rthdr={{0x88, 0x29, 0x39, {0xf3685737fa6ee9a5, 0xe, 0x1, 0xfffffffffffffff7, 0x0, [@loopback, @remote, @dev={0xfe, 0x80, [], 0x12}, @mcast1, @ipv4={[], [], @local}, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x400}}, @dontfrag={{0x14, 0x29, 0x3e, 0xaf}}], 0x2d0}}, {{&(0x7f0000005300)={0xa, 0x4e22, 0x0, @remote, 0x2}, 0x1c, &(0x7f0000005400)=[{&(0x7f0000005340)="1aac567bcd63e644fa63b411f7226b02e8a1fa5146aba7925d7119d05c75411ab528e14fdce5654a53cf654169099a059cb4006401065e7b8ed669a128d9ec12ceefcb929884cec1cee13674b343e75bb2f90f8c502175d9879a3c3421bf7519570aa41948da2239b3344a", 0x6b}, {&(0x7f00000053c0)="f6572240", 0x4}], 0x2, &(0x7f0000005540)=[@hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @flowinfo={{0x14, 0x29, 0xb, 0x6}}, @dstopts={{0x30, 0x29, 0x37, {0x5e, 0x2, [], [@hao={0xc9, 0x10, @mcast1}]}}}, @hopopts_2292={{0x80, 0x29, 0x36, {0xf5a63a30aacb753b, 0xc, [], [@calipso={0x7, 0x38, {0xfff, 0xc, 0x1, 0x2, [0x1c, 0xea, 0x1, 0x0, 0x6e, 0x1]}}, @hao={0xc9, 0x10, @remote}, @jumbo={0xc2, 0x4, 0x2}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x4}}], 0xf8}}, {{&(0x7f0000005440)={0xa, 0x4e20, 0x1, @remote, 0x9}, 0x1c, &(0x7f0000005480)=[{&(0x7f0000005640)="5072d0f431ea332d6ea0bcb18b250825ddfcedff649438aff00291620e75a3f719cf87c1a69a355c64ddc3de17bb40249423e34ea90f5465f911af63f22cfdfed91d01fd844ffb566100bba3a5ccd8995320ee18e1279a8ef8658024825e66b5994b3b67490c2fbe7912a1a1a2488066789077e25f5fd4aaa927a27150f326cb5122b58df802f6922a4b456157a87a1632be0d0973207765079c0a34b05762bee76dbd87409a1b076e1787caed489e621b900171fa890f927d3bb61378e00fb291003f27bfd1aa56", 0xc8}, {&(0x7f0000005740)="4fe2f4ff50aa9ac2b6d0a80cd351cb09a3dc36fca82830d6bc3dcb1da7e19d131614ed09add40596d037982453c1566c35f9d59657d17946693722114ad148a7a31a1bab539e6b443fe6c0bf36503fc4d1f0025d5fc48c05e75f39bf143a472982c0f72a7534ea3c5ae97ffb2fc53cce664b1551199c3432e660ac1039ec7937a907a9a04ac82c670c1d1a345f6d30ccabc69ff2e674af6f25fb87eacd34afa8ba92ffe540e50565e8bec4d992a4be0d0456b440a2d27a7819dcb1a57f513c85148a21509c0d6cd8dd6f47dedcf7759e14c6991284b1375bc10ad7227ec4832be19d517f3baafa3bad53d332a0", 0xed}], 0x2}}, {{&(0x7f0000005840)={0xa, 0x4e20, 0x6b1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x9}, 0x1c, &(0x7f0000005a80)=[{&(0x7f0000005880)="b1044601bd03cb3dfea7d1782a2cac8856600da6e1a8673c0be447e87cc7dd911e0565ef5269b455060b142f0a2da4999e73a4eed4018ad565ebe83e0a673bd6002ac964494d0e6a436223372ccce45a9274148377d46342484545d14f376408e86c8666c529b5c83a1838477e7b1b7950bdb49c477092af13778c4d40343a6572f0bc982098f75047a3002ae257d1cec4d0e362aed4ba3437dbcfc512b63036f7fe106dc60b82f4213d70689d25c096d8d4c6b6c8222931179e9000a07740881f29b90e695d2c6a", 0xc8}, {&(0x7f0000005980)="b31844e19f3265a49f4f3ce9a4651be444a7ad3f04071986e56184b98291acb377d188b181c87472c159a15a55318457aac91444767953f2dc38504bc16b44d0bd2f81ca14dfe4c2530b302443a30644dcacda840e473dcdcb2d214283437afbceb26a0f7cf4399567614df3c3e78347ca42830db34b3074e41694d2352bfa63d68eed5c3b26abc58c1a19f51a3d942e2cda0803e103bba5eb3fb49f81e929e358e763246db6bd711d36fdc2d91bfb6fa47d7751b1d12237fb057f93a3fae5bf34f15b4fe6b8105c01d80659b68797e3c4fbd35a2f2d895ce9490d0d", 0xdc}], 0x2, &(0x7f0000005b00)=[@dontfrag={{0x14, 0x29, 0x3e, 0xfff}}, @dstopts_2292={{0xd8, 0x29, 0x4, {0x2, 0x17, [], [@calipso={0x7, 0x48, {0x7, 0x10, 0x532, 0x3f, [0x3, 0x6, 0x7, 0x4000000000000, 0x10001, 0x2, 0x1, 0x4]}}, @calipso={0x7, 0x10, {0x6, 0x2, 0x6, 0x5, [0xdf]}}, @enc_lim={0x4, 0x1, 0x9e73}, @calipso={0x7, 0x10, {0x5, 0x2, 0x2, 0x5, [0x10001]}}, @calipso={0x7, 0x10, {0x7, 0x2, 0xe8, 0xfffffffffffffffc, [0x7]}}, @generic={0x1, 0x37, "b3cb0b5f3eafd862e2d4cdf4efdb0a1b9130108373dbcc2de16decbaa4c88df828b60e3f6dad828fe557f4c20f0c585987915941106186"}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@local, r4}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x26}}, @hopopts={{0xd8, 0x29, 0x36, {0x62, 0x17, [], [@generic={0x28, 0x2d, "3150118275a54ee6709c18aacf0f91e02deda4420cd4beac4f56be8e437230acdb96c73291ae757e79c5965b2e"}, @generic={0xafa, 0x69, "2fd9e2b1f75159fce50c94d28f8076b912d8be04ca36530031ada8a36909c3e77f7ffcb0415fdd43306fa423555be5f850146ad1859e07e53cbe15c7e951b80e04676a9e66846055ffdc55becb952927e612366a7a17d2b3b3964d423d306b5afeba6d62a5ab301cfc"}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @enc_lim={0x4, 0x1, 0x6}, @jumbo={0xc2, 0x4, 0xfff}, @jumbo={0xc2, 0x4, 0x5}, @pad1]}}}, @rthdr={{0x58, 0x29, 0x39, {0x33, 0x8, 0x3, 0x7, 0x0, [@mcast1, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @empty]}}}, @tclass={{0x14, 0x29, 0x43, 0x3}}, @dontfrag={{0x14, 0x29, 0x3e, 0x9f}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0xffff}}], 0x2a8}}], 0x4, 0x24048080) [ 654.638676] audit: type=1400 audit(1566087468.678:26379): avc: denied { map } for pid=23632 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 654.787579] audit: type=1400 audit(1566087468.688:26380): avc: denied { map } for pid=23632 comm="modprobe" path="/lib/x86_64-linux-gnu/ld-2.13.so" dev="sda1" ino=2668 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:49 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x800) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f00000000c0)=0x4, 0x4) exit(0xffffffffffffffff) [ 655.007992] audit: type=1400 audit(1566087468.738:26381): avc: denied { map } for pid=23632 comm="modprobe" path="/etc/ld.so.cache" dev="sda1" ino=2251 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 00:17:49 executing program 1: prctl$PR_CAPBSET_READ(0x17, 0xf) r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:49 executing program 5: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lstat(0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x2000, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f00000000c0)=0x4, 0x4) sendmsg$TIPC_NL_NAME_TABLE_GET(0xffffffffffffffff, 0x0, 0x0) [ 655.233201] audit: type=1400 audit(1566087468.758:26382): avc: denied { map } for pid=23632 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.297513] audit: audit_backlog=65 > audit_backlog_limit=64 [ 655.360761] audit: audit_lost=654 audit_rate_limit=0 audit_backlog_limit=64 [ 655.410595] audit: type=1400 audit(1566087468.768:26383): avc: denied { map } for pid=23632 comm="modprobe" path="/lib/x86_64-linux-gnu/libkmod.so.2.1.3" dev="sda1" ino=2811 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 655.423286] audit: backlog limit exceeded 00:17:50 executing program 1: r0 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r1, r2, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r0, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000040)) 00:17:50 executing program 3: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1, 0x1) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@loopback, @local, 0x0}, &(0x7f0000000140)=0xc) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) sendmsg$can_bcm(r0, &(0x7f0000000380)={&(0x7f0000000180)={0x1d, r1}, 0x10, &(0x7f0000000200)={&(0x7f0000000300)={0x3, 0x800, 0x9, {r2, r3/1000+30000}, {0x0, 0x7530}, {0x3, 0x8, 0x1, 0x746}, 0x1, @canfd={{0x1, 0xff, 0x2, 0xe68d}, 0x1b, 0x2, 0x0, 0x0, "7f80c016c7109baab491e542532a00a8ed40a9662247c6c814e9fa7eec0dce683559868cdc312a65dc0f8ce75a43b2686965963aa2c670c699c7302929542875"}}, 0x80}, 0x1, 0x0, 0x0, 0x800}, 0x4) syz_genetlink_get_family_id$tipc2(0x0) 00:17:50 executing program 4: eventfd2(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x80, 0x0) ioctl$KVM_SET_CPUID2(r0, 0x4008ae90, &(0x7f0000000240)={0x6, 0x0, [{0x0, 0xfffffffffffffffc, 0x2, 0x1, 0x0, 0xe77f}, {0x4000000b, 0x4, 0x2, 0x5, 0x7ff, 0x3ff, 0x81}, {0x6, 0x6a7aabdf, 0x7, 0x2, 0x0, 0x7, 0x4}, {0x6, 0x1f, 0x0, 0x2, 0x9, 0x2, 0x400}, {0xc0000001, 0x1, 0x2, 0xfffffffffffffe35, 0x8, 0x3b2, 0x35}, {0x80000007, 0x3ff, 0x2, 0x5, 0x4, 0x7ff, 0xc8a}]}) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x109102, 0x0) ioctl$BLKRESETZONE(0xffffffffffffffff, 0x40101283, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff, 0x0, 0x0, 0x0, 0x0, 0x500}, &(0x7f0000000200), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 00:17:50 executing program 2: fcntl$getown(0xffffffffffffffff, 0x9) socket$key(0xf, 0x3, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0) ioperm(0x1c00000000000000, 0x3f, 0x10001) r3 = dup(r2) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000002c0)={'U+', 0x4}, 0x28, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x12, &(0x7f0000000080)=0x1, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, 0x0, &(0x7f0000000200)) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)={&(0x7f0000000380)='./bus\x00', 0x0, 0x18}, 0xfffffe7c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f00000007c0)=0x2c0, 0x4) ftruncate(0xffffffffffffffff, 0x1d) syz_genetlink_get_family_id$tipc2(0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x400c6615, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000000)={@mcast1, 0x0, 0xc06d286400548d85, 0x2, 0x5, 0x8, 0x4}, &(0x7f00000001c0)=0x20) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xa4) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, 0x0, 0x0) r4 = open(&(0x7f00000000c0)='./bus\x00', 0x141042, 0x4010) lseek(0xffffffffffffffff, 0x60, 0x2) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r3, 0x54a2) ioctl$RTC_IRQP_READ(0xffffffffffffffff, 0x8008700b, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, 0x0, 0x0) recvfrom(r4, &(0x7f0000000800)=""/4096, 0x1000, 0x2000, &(0x7f0000000240)=@nfc_llcp={0x27, 0x0, 0x2, 0x5, 0x3, 0x3, "814f542c995207990391bc3478e227051392e705b96af9ed6853adc386c380647ec1085680ffc9faf98126c46e3e466a72ddd823ad1a196b2ff57fc5509b15", 0xe}, 0x80) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, 0x0) ftruncate(r4, 0x2007fff) sendfile(r3, r4, 0x0, 0x8000ffeffffe) 00:17:50 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f0000000100)={0x0, 0x7}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r1, 0x0, 0x9, 0x0, 0x9, 0x301}, 0x14) r2 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r3, r4, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f0000000000)) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f0000000040)) 00:17:50 executing program 0: clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x4000, 0x0) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000140)={{0x29, @multicast1, 0x4e20, 0x3, 'fo\x00', 0x1, 0x2, 0x1b}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x0, 0x1, 0x2, 0x8}}, 0x44) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="61124c00000000006113500000000000bf2000000000000007000000080000003d0301000000000095000000000000006926000000000000bf67000000000000150600000fff07003506000002000000070600000ee60000bf050000000000001f650000000000006507000002000000070700004c0000001f75000000000000bf54000000000000150400000400f9ffad43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x1f1}, 0x48) exit(0xffffffffffffffff) [ 656.380298] ------------[ cut here ]------------ [ 656.385450] WARNING: CPU: 0 PID: 6572 at kernel/bpf/core.c:537 bpf_jit_free+0x23a/0x310 [ 656.393576] Kernel panic - not syncing: panic_on_warn set ... [ 656.393576] [ 656.400931] CPU: 0 PID: 6572 Comm: kworker/0:3 Not tainted 4.14.139 #35 [ 656.407664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 656.417012] Workqueue: events bpf_prog_free_deferred [ 656.422105] Call Trace: [ 656.424677] dump_stack+0x138/0x19c [ 656.428296] panic+0x1f2/0x426 [ 656.431477] ? add_taint.cold+0x16/0x16 [ 656.435440] ? bpf_jit_free+0x23a/0x310 [ 656.439404] ? bpf_jit_free+0x23a/0x310 [ 656.443363] __warn.cold+0x2f/0x36 [ 656.446891] ? ist_end_non_atomic+0x10/0x10 [ 656.451195] ? bpf_jit_free+0x23a/0x310 [ 656.455146] report_bug+0x216/0x254 [ 656.458749] do_error_trap+0x1bb/0x310 [ 656.462611] ? math_error+0x360/0x360 [ 656.466384] ? debug_check_no_obj_freed+0x2aa/0x7b7 [ 656.471373] ? check_preemption_disabled+0x3c/0x250 [ 656.476372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 656.481187] do_invalid_op+0x1b/0x20 [ 656.484874] invalid_op+0x1b/0x40 [ 656.488301] RIP: 0010:bpf_jit_free+0x23a/0x310 [ 656.492852] RSP: 0018:ffff88805df0fcf8 EFLAGS: 00010297 [ 656.498187] RAX: ffff88805df02540 RBX: 0000000000000007 RCX: 1ffff1100bbe05c1 [ 656.505430] RDX: 0000000000000000 RSI: ffff88805df02de8 RDI: ffff8880854f1c50 [ 656.512672] RBP: ffff88805df0fd20 R08: 00000000f1bd5397 R09: ffff88805df02e08 [ 656.519916] R10: 0000000000000000 R11: 0000000000000000 R12: ffffc90001905000 [ 656.527160] R13: ffffc90001905002 R14: ffffc90001905018 R15: ffff8880a866af48 [ 656.534415] ? bpf_jit_free+0x23a/0x310 [ 656.538363] bpf_prog_free_deferred+0x31/0x40 [ 656.542830] process_one_work+0x863/0x1600 [ 656.547049] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 656.551697] worker_thread+0x5d9/0x1050 [ 656.555657] kthread+0x319/0x430 [ 656.558995] ? process_one_work+0x1600/0x1600 [ 656.563458] ? kthread_create_on_node+0xd0/0xd0 [ 656.568099] ret_from_fork+0x24/0x30 [ 656.573007] Kernel Offset: disabled [ 656.576702] Rebooting in 86400 seconds..