NT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 766.391850] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 766.400342] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:14 executing program 3: 19:29:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) ioctl$PPPIOCDISCONN(r4, 0x7439) close(r4) [ 766.761767] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:14 executing program 3: [ 766.890722] keychord: invalid keycode count 0 [ 766.994296] keychord: invalid keycode count 0 19:29:15 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='\x00\x00\f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x48c107, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x400000, 0x0) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:15 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_open_pts(r4, 0x2) write$eventfd(r0, &(0x7f0000000140), 0x8) 19:29:15 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) writev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="27609a2e3d00b80b4f0942081f9519ccc509da5a154a1374961232291575017e9b5e6d794b9060f4f3a206592a8332577b9fb88d04987f6abcf83cb2c18f549e346354febfece891fff8919e40e66e2565feca8a6b8128916ffd589c46e0f6648736fafe71b84349bfd3d717deafb62a2a909f24ac5d92b3e1907192aa3c128b734c6c6afc4dbfffdba93943ea72e384100e1a037ad15651ba7279f9b267ca95c6657ef1d24d177c51fd96ccf3eab10082a643ca07a756989e43f1", 0xbb}, {&(0x7f0000000180)="bc59fb835268d17fce8593a09f724c69caeceefa9a3a57b58ba08c8c6d7abf37123968c99f133410270cbcc523d8b3b7124269d0de08f9ec12613583c4db57530a72638012ac04", 0xffffffffffffffb8}], 0x2) [ 767.080559] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 767.281783] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r4) 19:29:15 executing program 3: 19:29:15 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r0, &(0x7f0000000000)=0xfffffffffffffffc, 0xfffffffffffffe82) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100)) 19:29:15 executing program 5: open(0x0, 0x0, 0x1c0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r0 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r0, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r0, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r1, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r0, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 767.561635] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 767.780481] keychord: invalid keycode count 0 19:29:15 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) r2 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) fadvise64(r2, 0x2, 0x9, 0x3) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r4) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r3, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RSTATFS(r6, &(0x7f0000000040)={0x43, 0x9, 0x1, {0x40, 0x5, 0x0, 0x9, 0x8e3d, 0x6, 0x3, 0x2, 0x100}}, 0x43) [ 767.910945] audit_printk_skb: 57 callbacks suppressed [ 767.916183] audit: type=1400 audit(1573846155.845:2064): avc: denied { read } for pid=31291 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:15 executing program 3: 19:29:15 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) close(0xffffffffffffffff) 19:29:16 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) sync() fcntl$dupfd(r2, 0x0, r3) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000040)={@mcast2, 0x7fffffff, 0x2, 0x2, 0x1, 0xce0a}, 0x20) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$BLKBSZGET(r4, 0x80081270, &(0x7f0000000000)) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) 19:29:16 executing program 4: r0 = open(0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_pktinfo(r3, 0x0, 0x8, &(0x7f00000004c0)={0x0, @multicast2, @local}, &(0x7f0000000580)=0xc) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fgetxattr(r4, &(0x7f0000000000)=@known='system.sockprotoname\x00', &(0x7f0000000040)=""/51, 0x33) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000100)) syz_genetlink_get_family_id$net_dm(0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) r7 = add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={'syz', 0x0}, &(0x7f0000000200)="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", 0xfe, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x4001fd) setsockopt$inet_tcp_TCP_CONGESTION(r10, 0x6, 0xd, &(0x7f00000005c0)='vegas\x00', 0x6) r11 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r11, 0xe}, &(0x7f0000000500)=ANY=[@ANYBLOB="656e633d6f61657020686173683d7368613531322d61767832000026f3a06772000000000000e6ffffffffffffff0000000000000000000000000000000000af00000000000000000000000000008a7608e38e74f69f707dd02d0fc6d0cbe581f2f0e5c2e2d26c"], &(0x7f00000001c0)="772724d4ac2b107bc7befd976d50", 0x0) r12 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r12, 0xe}, &(0x7f0000000500)=ANY=[@ANYBLOB="656e633d6f61657020686173683d7368613531322d61767832000026f3a06772000000000000e6ffffffffffffff0000000000000000000000000000000000af00451700000000000000000000008a7608e38e74f69f707dd02d0fc6d0cbe581f2f0e5c2e2d26c"], &(0x7f00000001c0)="772724d4ac2b107bc7befd976d50", 0x0) keyctl$dh_compute(0x17, &(0x7f0000000300)={r7, r11, r12}, &(0x7f0000000340)=""/135, 0x87, &(0x7f0000000480)={&(0x7f0000000400)={'sha512_mb\x00'}, &(0x7f0000000440)="38e02e16ee41eab839", 0x9}) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 768.125403] audit: type=1400 audit(1573846156.055:2065): avc: denied { create } for pid=31306 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 768.250894] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 768.322122] audit: type=1400 audit(1573846156.255:2066): avc: denied { write } for pid=31306 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:16 executing program 3: [ 768.540505] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 768.712183] keychord: invalid keycode count 0 [ 768.763919] audit: type=1400 audit(1573846156.685:2067): avc: denied { create } for pid=31321 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:16 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) close(0xffffffffffffffff) [ 768.790625] audit: type=1400 audit(1573846156.725:2068): avc: denied { read } for pid=31306 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 768.822107] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 768.880660] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:16 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) 19:29:16 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(0x0, 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:16 executing program 3: [ 769.008222] audit: type=1400 audit(1573846156.935:2069): avc: denied { write } for pid=31321 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 769.190587] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:17 executing program 1: openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000080)='TRUE', 0x4, 0x3) 19:29:17 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) close(0xffffffffffffffff) 19:29:17 executing program 3: [ 769.483609] audit: type=1400 audit(1573846157.415:2070): avc: denied { create } for pid=31343 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 769.552254] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:17 executing program 4: open(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$cgroup_ro(r2, &(0x7f0000000100)='cpuacct.usage_sys\x00', 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000280)={'syz0', "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"}, 0x103) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(0xffffffffffffffff, 0x660c) syz_genetlink_get_family_id$net_dm(0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$selinux_load(r8, &(0x7f0000000180)={0xf97cff8c, 0x8, 'SE Linux', "eb993dc1551fd4e4056345d6f2a0ffc99fde6b75701abf68217a6ed6867f09b87c4f9af9b376dc0193b6727bacc99f61a38f94753a84f1193ef19506c4bed9a00553313f41fef7da9c008de05562d540b684e7546b0b482a4f59f03cea8737354c8bf59ab66833cc2b5fd870662b4aec9b5edb19fe3324c18ea0783dca12068e5f30e992bdf9e9f6773511c6f0978d1f2d0e16e9f11352c78f12754d881e523eaafd6bbbe4550248beedad152373fe3b866bfbf64c796bc21ab58f928b49cba834948d91008534ae8d77407a95af9920b807af6531b87c5e"}, 0xe8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) r9 = open(&(0x7f0000000000)='./file0\x00', 0x4000, 0xabc092f6077c6478) openat$cgroup_ro(r9, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r10 = dup(0xffffffffffffffff) ioctl$BINDER_SET_MAX_THREADS(r10, 0x40046205, &(0x7f0000000080)=0x1) [ 769.653789] audit: type=1400 audit(1573846157.585:2071): avc: denied { write } for pid=31343 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 769.690761] keychord: invalid keycode count 0 [ 769.690827] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 769.844988] keychord: invalid keycode count 0 19:29:17 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x400000, 0x0) 19:29:17 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r5, &(0x7f0000001080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000000)={r7, 0x1, 0x6, @broadcast}, 0x10) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) [ 769.881630] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:17 executing program 3: 19:29:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r4) [ 770.131197] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 770.212817] audit: type=1400 audit(1573846158.145:2072): avc: denied { create } for pid=31364 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:18 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(0x0, 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 770.431500] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 770.438900] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:18 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$inet6(0xa, 0xa, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@multicast1}}, &(0x7f0000000840)=0xe8) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r5, &(0x7f0000001080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000880)={@remote, 0x0}, &(0x7f00000008c0)=0x14) r9 = socket$inet_udplite(0x2, 0x2, 0x88) r10 = socket(0x100000000011, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r9, &(0x7f0000001080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d40)=0x14) sendmmsg$inet(r3, &(0x7f0000000e40)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000180)="fe257c7efd83e3bffbfcc47d3eeff3829b085afa191b78eb882768bb0c1800f10adbae8a1151e0e072823830a642d2f55ebf27c258d8e8f589e51cae63361be5f669800890c6e882f7c84265a0b5781914c60e3f2858a0f59cbecd53a7bb13d1a602f4be1406107cf0a8a4f26423c8b8ef315d369efe2a3f52ab4a7ffbb44f41399df4a5d8d24e8c", 0x88}], 0x1}}, {{&(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000100)="29b136e7d08d22cba4bebcd69eca3ade0d003f10e40e1eb69fe08a7c23ac4390fbcbe1934c2b3dc0cf4e34f0e84a", 0x2e}], 0x1}}, {{&(0x7f0000000280)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000002c0)="9dd3108ba2cfa09f36fce352b0b1b34c1c6424a1d56acac4d80462c8a5b698e3c635a88dc3e6a3a17defd14c265e2bdcc1b843b7385bd391af65977417d71fd69158e08195e2f262881cc600638f51c0197e2ebcc4a7a76eab6dc1e87f9f8771de6bee54b1f30b94fab12c4555026b1e88fe473d88168c78f7bace43f3520a54bddf2161d78feeebbb8345280b865b251258feef9e65b0fa945b1e027503ce484954055fc295e2fe6ded139c086be4c56cb4c3333100176c6b6fdbe645dacecc1ee8ec8f33d30c4c55a8b2e5e3a52bda1c9395bb", 0xd4}, {&(0x7f00000003c0)="feffccb0d1aaa4c8ec6a9b5b2420c48a6176eb627429ea146c3c6467093c1655fc7055b24a53db39ad31d5a2f6ec06ffe32202ca34aa13d263db102bc8a2895e2cde7df1d19262d019abd38425cc5a91b090769e72fca4d62b7d041cc700e6f7d20153a2d5db95241c60b8202a00ce12de4b61beb12ad82638c2c2ab26e5af43f2903760d0c7178f6c59681165a358a7b29d51362eca", 0x96}, {&(0x7f0000000480)="51ced10c6e84e11503ad392b6bd18169a16cbd43394d94ca68ea3d694c4d4d246f36cba989404afa03bc755003b9106c76f2397072d796573d66507cc29dc5272031498e45df44453589d30a058973748b5537bafc7365b722e488efad5419f724bede894d0127b408687958e7d7633fe12d0f86638b3ffb22c784a00208da67eb95dbaed06a448516c52d9c111d90ed3f8af15539a4e5c99cbcaa438a7328095b12bec75d388d3b137f30f4e5e0faa3f0fddbd0865e60fdf7195cfed1d172b428ca89240656d7b45dd4079a", 0xcc}, {&(0x7f0000000580)="2256bbc4ec1535d6df1ce1e4714c36a5b60f651259610ae2b70fde1cbecbfdadc40cd24e4df5854f7aee738911827a64abd17d0ae6d06e1c", 0x38}, {&(0x7f00000005c0)="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", 0xff}], 0x5, &(0x7f0000000900)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast1, @rand_addr=0xff}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @local, @broadcast}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x6}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @loopback, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x9}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @local, @remote}}}], 0xc8}}, {{&(0x7f0000000a00)={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000c00)=[{&(0x7f0000000a40)="f808c1ad285cab319cbcf2236da482e6ad4a9330", 0x14}, {&(0x7f0000000a80)="b6d55fdbba4107f19eafad951bc631aad1b486f631b8a570070e3ac1", 0x1c}, {&(0x7f0000000ac0)="1ec77be968d075736827e59b8a04a925f3819d0f793aa25c4e5b74b9a1d976b768be8d6d170bd6de481abb18e7e6af71be4200ea2ca427a572e960277ea4f0cc9cfd87dbfd8fc0bbc623b37e55601dd4e38bca9518", 0x55}, {&(0x7f0000000b40)="07f3d9b27b9b523616ef8fb5e70edc8fb7616f5b7a11bea6ff773ecfd99c19a25ee9edde992b6266fdbdc9261d9184e5de7679b48fff4ff04132e48b6c5fb90b1e86a9f4f49fccfb581c5dc10f73fb796f2b6743a71a5ff823aff107a3956dada094b10e16444e87b34f13e38e0a596374bf00ee90ccb22d021cff7abe6a5d2496b90da7d2f4d2ceef61b405378021d89cf22e497370d92dda139f9dec20e73e4362b31e221da5fef279190fef7eac9b344d58", 0xb3}], 0x4, &(0x7f0000000d80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x8}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x53}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r12, @remote, @remote}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x4}}], 0x98}}], 0x4, 0x4) write(0xffffffffffffffff, 0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:18 executing program 3: 19:29:18 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r1 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000200)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0xa}}) recvfrom$unix(r1, &(0x7f0000000000)=""/135, 0x87, 0x4000, &(0x7f0000000180)=@abs={0x1, 0x0, 0x4e22}, 0x6e) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) [ 770.821889] keychord: invalid keycode count 0 19:29:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r4) [ 770.918257] audit: type=1400 audit(1573846158.845:2073): avc: denied { create } for pid=31380 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:18 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000003, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) [ 770.996448] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:19 executing program 3: [ 771.340572] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 771.349058] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 771.369865] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 771.551091] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:19 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(0x0, 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:19 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r4) 19:29:19 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x12f85e) clone(0x2000000002000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000140)={@remote, 0x0, 0x2, 0x2}, 0x100000033) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x19) fcntl$setstatus(r0, 0x4, 0x80000000002c00) [ 771.717321] keychord: unsupported version 3 [ 771.733613] keychord: invalid keycode count 0 19:29:19 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000300060000000000020000007f000001000000000000000002e0000000000000000000000000000003000000ff00000002000000e00000010000000000000000"], 0x50}}, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000180)="82fb52c57486cf583aa638d8d2b2b68aa6aa20be0010fec34301d0767940093741d55dacda19d449fdf301359c7664eb8593c644153e9e838d966771e00520fe8241f78d4ca9d70875ac320b7bf1ddb58509d12dddf87c7b265b74bc2dd674404a805e9e04248fc5b5", 0x69}], 0x1, 0x0) dup2(r1, r0) write(r0, &(0x7f0000000000)="0c9d34eb59c6f9a0a6fcdc2b8bbec0283cf190c0b2e13405054d01639cf133b9e1b6001a72073d897db567b3ca6109b978684f25f5755a67df69d67ddf405718314f208d78e4888d731ab3f0816211dc393095b34a52b3", 0x57) write$eventfd(r0, &(0x7f0000000140), 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x1) inotify_rm_watch(0xffffffffffffffff, r6) inotify_rm_watch(r5, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r10, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r9, 0x3, r10, &(0x7f0000000100)={0x10000008}) [ 772.093370] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:20 executing program 4: open(0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = openat$cgroup_int(r3, &(0x7f0000000000)='cpuset.cpu_exclusive\x00', 0x2, 0x0) tee(r4, r0, 0x5, 0x8) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) r7 = socket$key(0xf, 0x3, 0x2) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x30, 0x0, 0x1f, 0x5, 0x1, 0x3, 0x6, 0x23a, 0x40, 0x18d, 0x8, 0x9, 0x38, 0x2, 0xf89, 0x4, 0x9}, [{0x60000000, 0x7, 0x6, 0xff, 0x7fff, 0x81, 0x8e, 0x80}], "038b282f2f6bd527957accdf2ef63f9210947cb65d22e22293c4c84d8d15c63aad6416a11a380003902b425ff0cab2110ff2733501ecbc2feb210865176149a6ffa03d607ccd4294dd8d8872fa8663d73399731f5447e7230b5d253c418e17428a5c", [[], [], [], [], []]}, 0x5da) sendmsg$key(r7, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup2(0xffffffffffffffff, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:20 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:20 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='+de\xf9\xfdkeychord\x00', 0x6f32774108040f6c, 0x0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) [ 772.420488] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:20 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r4) [ 772.591160] keychord: Insufficient bytes present for keycount 81 19:29:20 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x400, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x64000, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x3298, 0xaf) 19:29:20 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r0, &(0x7f0000000140), 0x237) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a0000000000000000000000f2ff050000000000020000007f000001000000000000000002000100000000000000000000000000030000000000000002000000e00000010000000000000000"], 0x50}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, &(0x7f0000000180)={0x0, {0x2, 0x4e23, @local}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x22, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000040)='vcan0\x00', 0x401, 0x8, 0x8000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'nr0\x00', 0x8800}) 19:29:20 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f0000000200)='devpts\x00') r0 = gettid() tkill(r0, 0x3c) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) open(0x0, 0x0, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x1400) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000580)={{{@in6=@mcast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x80, 0x0, 0x0, r3}, {0x3fde2800, 0x0, 0x7, 0x0, 0x0, 0x7, 0x4, 0xfffffffffffffffd}, {0x0, 0x0, 0x7, 0x5}, 0xfff, 0x6e6bbd, 0x2, 0x0, 0x2, 0x3}, {{@in=@dev, 0x40, 0x3c}, 0xa, @in=@multicast1, 0x0, 0x8476f732d1874694, 0x0, 0x0, 0x3}}, 0xe8) quotactl(0x6, &(0x7f0000000000)='\x00', 0x0, &(0x7f0000000040)="3d487bd38388c47e6523bd77099abc8e830f8bdbe7de36a7ce75c64a8d48b27a1cbfd43af29d5c174d7051428dc1f79362c961aa517255b21005159cbb261b4d06c0b1d843862cc69efa693751d4491b42bde46e515c9ea7e84e3ea2a7b748236a1b600c9b61c7ae8aaec1b70f7381271a1f540b06f967f664dff086aa248700da5f3a5470effc08199b") socket$packet(0x11, 0x2, 0x300) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="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", @ANYBLOB, @ANYBLOB="110100000000000091c46cf6960b8c2747655a6800000000000000007bfdc10e344a4c86914bece2dced4ebc5c83001d02d4f340034afaecef242f6ac292625d956492ef020000008d7884aa1e81a0f3c50636dd23f5c2e9b02d4e2c02"], 0x5, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) recvfrom$inet6(0xffffffffffffffff, &(0x7f00000001c0)=""/31, 0xfffffffffffffe3c, 0x100, &(0x7f0000001880), 0x17c) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) r7 = ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, r7) [ 773.053165] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 773.106894] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r4) [ 773.225628] audit_printk_skb: 48 callbacks suppressed [ 773.243371] audit: type=1400 audit(1573846161.155:2090): avc: denied { read } for pid=31446 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 773.315099] audit: type=1400 audit(1573846161.245:2091): avc: denied { read } for pid=31444 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 773.450525] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 773.457911] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 773.545602] keychord: invalid keycode count 0 19:29:21 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'nlmon0\x00', 0x1}, 0xfffffe20) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x80000000008936, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 19:29:21 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fsync(r0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:21 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x200002, 0x0) openat$cgroup(r0, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140), 0x8) [ 773.801251] keychord: invalid keycode count 0 19:29:21 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:21 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) listxattr(&(0x7f0000000040)='./bus\x00', 0x0, 0x15) 19:29:21 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r4) [ 774.032503] audit: type=1400 audit(1573846161.965:2092): avc: denied { create } for pid=31481 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 774.106633] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:22 executing program 3: socket$inet_tcp(0x2, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_tcp(0xa, 0x1, 0x0) creat(&(0x7f0000000700)='./bus\x00', 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'syz_tun\x00', &(0x7f0000000040)=ANY=[@ANYRES64=r1]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xc) r2 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000000)={'syz_tun\x00', 0x0}) [ 774.189904] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 774.238103] audit: type=1400 audit(1573846162.165:2093): avc: denied { write } for pid=31481 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 774.390624] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:22 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) close(r0) [ 774.457513] audit: type=1400 audit(1573846162.365:2094): avc: denied { create } for pid=31493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 774.580436] keychord: invalid keycode count 0 [ 774.581355] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 774.660198] audit: type=1400 audit(1573846162.585:2095): avc: denied { write } for pid=31493 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 774.700161] audit: type=1400 audit(1573846162.625:2096): avc: denied { read } for pid=31481 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 774.724567] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:22 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:22 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x0) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:22 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ffc000/0x4000)=nil) [ 775.054835] audit: type=1400 audit(1573846162.985:2097): avc: denied { create } for pid=31481 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 775.079859] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 775.134958] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 775.180281] audit: type=1400 audit(1573846163.105:2098): avc: denied { write } for pid=31481 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:23 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='maps\x00') ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000340)={0x0, 0x2, 0x101, 0x8, 0x3f, 0x1}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000380)={0xfffffffffffffffc, 0x3, 0x6}) [ 775.310586] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:23 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fchdir(r2) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 775.541436] audit: type=1400 audit(1573846163.465:2099): avc: denied { create } for pid=31521 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:23 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 775.694422] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 775.729971] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:23 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r2, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r5 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r3, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r3, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c65300aea205486396972100d97c042b2cd9252689db19239e8a5606e6635ddee806b5f917ba77a9d73c005f1d65ab06dcefc57551c9d41fbc241e44552829a60768e93d001671f3effb1f1ef2ae12e108339e01432fb49132d56cd027b2e1c17a9f416e5f982e0e6a5627c7c8622d30435d28ff9ac41074a89eb0a605441116a309995c5280c53b4ba8527106e7275ab7b1b7dfc2e916adc640c7a441cb0d319c93a8c46bf6b74171178be3dc9d4069c500000000000a6524126f1fdaf7dd82c4e83ecc7b60600f45e9602e1d2ea4470ece86713678f239e277019b632afc6e09aa720c7620b36940af961f0ccc095ef8ece8377b84cc3b9f26fcd4e9cdf9a941f3d3a1114b5cfa5432d36bbd84a3407c901385764a5697cbd02e5092ccf5a054450daf8a436f2ad8a00076381db30872f54d3d8be1c803cd3f0a3134ec8b4977cdb1f95e90d0294f2d9d53b70c425e0c0b175ffdb8a43ee659f31793971ee7b56b2141f1ea0da7f7bebc0a221234c5cf78bf9edae73082e8c2d16d443d7b0b515d7015bf19b844c202cff07ffff2158bc5e7a51432573c5d5842504bd6ac17200535a53ff3b2c8f6d88eca4a2644ac91970d1ca2db0e6361a19e9606bdaa3892320d499b2a82743d51374c501d8d0cbfa078883e070404db9f62b570ccce8c97b4734affa8da72fe3927026094ddaa41ee7b840ea941c99f795cef5e0b1d1168c2fa632a4105eaf445d0e0cd5248bad0bf5b73a8e1053df88e5494f952d8fe9ccba0ea6b54d397195ba248b5c4090b82857dc1f69d92a7714dc0383e2bb157d0e31cff09c2b98f55761c08cf6d32c9cdb98494d7c56187514597f7bbc438ce3b55fb08d6437746343ebd89aec4a7f863c9865e2b27008bfbc4439a8478292b291ef7979590e0583d607cb899548c98610c645cf5848f1a1ea61277852e44473db56bff0dfd6f6752cf5c30600eeff00000000de8ce0505e8ab69b19fa7067c68a0601eb32e23a79b9fa008fc3e75729acf724096b42a1d484dc5efdb00c39240c0b71b81c7636695a0caae60800008000000000cb788992f654f201817a77dadb046bace09f06666bea92cb87abcd83c41b2db3b402174a7daaba729067ddb040ed96a4a533c600c8eb0042651150a50028bd8618e9f243728b129c4c0b52403edfa4ffa2aa53d4cc45703c0585a625f9e5242159275364a684460d0c076ec6e5c3b0ca1a10dc81c637eb157f32cdb431e829f405694750c3d616910918a51e93bfc3a7bb847709c20765c73895d94ad8747a1a1a5249e045622f5b2edd5add39b7aecbe44d850d8e389074f459c7fb4a2cc16bef0cc1b4d8b01c4a2595499d872595c4183edc0b67c32c177b771221d536b9652a5a3538c334461430149b02412c29131dac1badba1ed40bf544b7982e66373c8c0178f38e2edfcccbefa3ee99440443a21b19a78313d66b7cb3001214ab6307b7609045e35e72d6fcbfeb9080df33ec0c308724b5fc586bb8996320f65cdb9304e2681a63ba391013ac7cdc524fd25482c14b4e88cb2a13ed6543aaaba0c508a8536e50bfb4703f597add132bff712fef0d2d1b831d5801513e141262"], 0x3be) setsockopt$sock_int(r3, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r3, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYRESDEC=r4, @ANYRES64, @ANYRESHEX=r6], 0xffffffffffffffcc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) write$P9_RGETATTR(r1, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x10, {0xa2295f92d11f4bb7, 0x1, 0x1}, 0x0, r6, r7, 0xfffffffffffffff8, 0xffffffff, 0x4b2, 0x4800000000000, 0x1ff, 0x7, 0x0, 0x81, 0x6, 0x2, 0x7, 0x7, 0x8, 0x3, 0x8}}, 0xa0) [ 775.940527] keychord: invalid keycode count 0 19:29:23 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_udp_encap(r4, 0x11, 0x64, &(0x7f0000000000)=0xa, 0x4) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) [ 776.041132] keychord: invalid keycode count 0 [ 776.240503] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 776.259114] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:24 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='maps\x00') ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000340)={0x0, 0x2, 0x101, 0x8, 0x3f, 0x1}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000380)={0xfffffffffffffffc, 0x3, 0x6}) 19:29:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000080)=0x14, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 776.521258] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:24 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 776.691974] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 776.922119] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 777.021058] keychord: Insufficient bytes present for keycount 154 19:29:25 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x2, 0xfffffffffffffe74) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r2, &(0x7f0000001080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'yam0\x00', r4}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vxcan1\x00', r5}) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r6, 0x0, 0x480, &(0x7f0000000100), &(0x7f0000000200)=0x40) 19:29:25 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='maps\x00') ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000340)={0x0, 0x2, 0x101, 0x8, 0x3f, 0x1}) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000380)={0xfffffffffffffffc, 0x3, 0x6}) [ 777.171550] keychord: invalid keycode count 0 [ 777.176192] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 777.218070] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:25 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='{\x00', 0x4) fsetxattr$security_evm(r0, &(0x7f0000000200)='security.evm\x00', &(0x7f0000000240)=@v2={0x5, 0x3, 0xb, 0xfffffbff, 0x7d, "aa34a0a94ac3235327b5ee38d40c629dd0b8f1665fe5f6003c19332fb3820f32a25bb7d44d34a52abf985e12f5c230174aa99a3019d6e4057521e249ace40191884c1a3996bc063a14dd85031cb0b36558c2dfea4d8de5efdb5c51d050ff9e5cabd13ec5f2c62dd326cffdad89f2ed4872131cab29de576b7ea4354e1c"}, 0x87, 0x1) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.usage_percpu\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x4) r2 = gettid() ptrace$peek(0x4, r2, &(0x7f0000000000)) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r3, r1) write$eventfd(r1, &(0x7f0000000140), 0x8) [ 777.566775] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:25 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 777.901536] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 777.910324] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 778.071998] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:26 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:26 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='maps\x00') ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000340)={0x0, 0x2, 0x101, 0x8, 0x3f, 0x1}) [ 778.310612] keychord: invalid keycode count 0 [ 778.315837] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 778.362483] audit_printk_skb: 36 callbacks suppressed [ 778.367719] audit: type=1400 audit(1573846166.295:2112): avc: denied { create } for pid=31611 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:26 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup(r2) write$eventfd(r0, &(0x7f0000000140), 0x8) [ 778.441141] keychord: invalid keycode count 0 19:29:26 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r0, 0xffffffffffffffff) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000240)={0x2, 0x400000000000003, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, @sadb_address={0x5, 0x481d4c05bad6402b, 0x0, 0x0, 0x0, @in6={0xa, 0x4e21, 0x0, @initdev={0xfe, 0x88, [], 0x8, 0x0}, 0x615}}]}, 0x60}}, 0x8011) readv(r1, &(0x7f0000000100)=[{&(0x7f0000000000)=""/19, 0x13}, {&(0x7f0000000040)}, {&(0x7f0000000180)=""/150, 0x96}, {&(0x7f0000000080)=""/32, 0x20}], 0x4) [ 778.548059] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 778.584739] audit: type=1400 audit(1573846166.515:2113): avc: denied { write } for pid=31611 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:26 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 778.744288] audit: type=1400 audit(1573846166.675:2114): avc: denied { create } for pid=31622 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 778.768941] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 778.839525] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 778.895543] audit: type=1400 audit(1573846166.825:2115): avc: denied { dyntransition } for pid=31623 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 778.965910] audit: type=1400 audit(1573846166.895:2116): avc: denied { write } for pid=31622 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 779.088110] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 779.091959] audit: type=1400 audit(1573846167.025:2117): avc: denied { read } for pid=31611 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:27 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='maps\x00') ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000340)={0x0, 0x2, 0x101, 0x8, 0x3f, 0x1}) 19:29:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 779.442721] audit: type=1400 audit(1573846167.375:2118): avc: denied { create } for pid=31611 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:27 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 779.572162] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:27 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000180)={{0x2, 0x2, 0x4, 0x0, 0x2}, 0x1, 0x5, 'id1\x00', 'timer1\x00', 0x0, 0x3, 0xffffffff, 0x5e1, 0xffffffff}) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r0) write$eventfd(r0, &(0x7f0000000140)=0x6, 0x8) socket$netlink(0x10, 0x3, 0x10) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) write$P9_RSYMLINK(r3, &(0x7f0000000040)={0x14, 0x11, 0x1, {0x10, 0x4}}, 0x14) [ 779.630636] keychord: invalid keycode count 0 19:29:27 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000180)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x9, 0x2, 0x0, 0x70bd29}, 0x10}}, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000)='trusted.overlay.redirect\x00', &(0x7f0000000040)='./file0\x00', 0xfffffffffffffd30, 0x1) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) [ 779.804294] audit: type=1400 audit(1573846167.735:2119): avc: denied { dyntransition } for pid=31647 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 19:29:27 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='maps\x00') ioctl$VT_RESIZEX(r7, 0x560a, &(0x7f0000000340)={0x0, 0x2, 0x101, 0x8, 0x3f, 0x1}) 19:29:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 780.119706] audit: type=1400 audit(1573846168.045:2120): avc: denied { create } for pid=31662 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 780.223686] audit: type=1400 audit(1573846168.155:2121): avc: denied { create } for pid=31661 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 780.311523] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 780.338099] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 780.550868] keychord: invalid keycode count 0 [ 780.556132] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 780.587711] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:28 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r2, 0xc080661a, &(0x7f0000000000)={{0x1, 0x0, @descriptor="5d2aa4a1659708d7"}}) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000001c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x6000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000000/0x2000)=nil, &(0x7f0000000180)="2978ac42268e0b3dfdba16afdb", 0xd}, 0x68) r3 = fcntl$getown(0xffffffffffffffff, 0x9) sched_setparam(r3, &(0x7f0000000100)) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 780.791042] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:28 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='maps\x00') [ 780.950552] keychord: invalid keycode count 0 [ 780.951201] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:29 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:29 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev\x04\x00\x00\x00\x00\x00\x00\x00\x8b\x00', 0x80000, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$P9_RLCREATE(r0, &(0x7f0000000000)={0x18, 0xf, 0x2, {{0x6, 0x3, 0x4}, 0x3}}, 0x18) write$eventfd(r0, &(0x7f0000000140), 0x8) [ 781.230902] keychord: invalid keycode count 0 [ 781.231126] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:29 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/\xfb\x9c\xcap\x95\xdbU\xb5\xbcq\xf8d\x00', 0x802, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) ioctl$EVIOCRMFF(r0, 0x40044581, &(0x7f0000000000)=0x26a8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_elf64(r3, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0x3, 0xbd, 0x0, 0x0, 0x3, 0x0, 0x2, 0x20d, 0x40, 0x36c, 0x81, 0xfff, 0x38, 0x2, 0xffff, 0x1, 0x62b}, [{0x1, 0x7, 0x4, 0x1fb5, 0x9, 0x1, 0x1f, 0x6}], "ae7e01dce1326c089b04a31cb532d672125fa41366950b7191e78064f1ea0d1ad9d79d4518bf0338a8679272e6af90f2ad6953f67359203d", [[], [], [], [], [], []]}, 0x6b0) [ 781.440578] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:29 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:29 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) listen(r0, 0x6) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup2(r2, r3) write$eventfd(r0, &(0x7f0000000140), 0x8) pipe(&(0x7f0000000000)) [ 781.663717] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:29 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:29 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) keyctl$setperm(0x5, 0x0, 0x20002) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 781.960742] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:30 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000180)=""/217) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000200)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0xa}}) getpeername$unix(r3, &(0x7f0000000040)=@abs, &(0x7f0000000100)=0x6e) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:30 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 782.216445] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 782.541349] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:30 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 782.742385] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:30 executing program 2: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$eventfd(r1, &(0x7f0000000000)=0xfffffffffffffffd, 0xffffffffffffff0d) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) 19:29:30 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) close(r2) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup2(r3, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 783.063329] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 783.100495] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:31 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 783.300616] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 783.386205] keychord: invalid keycode count 0 19:29:31 executing program 4: open(0x0, 0x10000, 0x3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x10030002, 0x1) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:31 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self\x00', 0x800, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x9, 0x400}) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:31 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(0xffffffffffffffff, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 783.561859] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:31 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r0) [ 783.963084] audit_printk_skb: 78 callbacks suppressed [ 783.991399] audit: type=1400 audit(1573846171.885:2148): avc: denied { create } for pid=31786 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 783.998023] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 784.023622] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 784.209913] audit: type=1400 audit(1573846172.135:2149): avc: denied { create } for pid=31792 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 784.265015] audit: type=1400 audit(1573846172.185:2150): avc: denied { write } for pid=31786 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:32 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r3, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r4, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r6 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r4, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r4, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c65300aea205486396972100d97c042b2cd9252689db19239e8a5606e6635ddee806b5f917ba77a9d73c005f1d65ab06dcefc57551c9d41fbc241e44552829a60768e93d001671f3effb1f1ef2ae12e108339e01432fb49132d56cd027b2e1c17a9f4829829d416e5f982e0e6a5627c7c8622d30435d28ff9ac41074a89eb0a605441116a309995c5280c53b4ba8527106e7275ab7b1b7dfc2e916adc640c7a441cb0000100000000000074171178be3dc9d4069c500000000000a6524126f1fdaf7dd82c4e83ecc7b60600f45e9602e1d2ea4470ece86713678f239e277019b632afc6e09aa720c7620b36940af961f0ccc095ef8ece8377b84cc3b9f26fcd4e9cdf9a941f3d3a1114b5cfa5432d36bbd84a3407c901385764a5697cbd02e5092ccf5a054450daf8a436f2ad8a00076381db30872f54d3d8be1c803cd3f0a3134ec8b4977cdb1f95e90d0294f2d9d53b7025e0c0b175ffdb8a43ee659f31793971ee7b56b2141f1ea0da7f7bebc0a221234c5cf78bf9edae73082e8c2d16d443d7b0b515d7015bf19b844c202cff07ffff2158bc5e7a51432573c5d5842504bd6ac17200535a53ff3b2c8f6d88eca4a2644ac91970d1ca2db0e6361a19e9606bdaa3892320d499b2a82743d51374c501d8d0cbfa078883e070404db9f62b570ccce8c97b4734affa8da72fe3927026094ddaa41ee7b840ea941c99f795cef5e0b1d1168c2fa632a4105eaf445d0e0cd5248bad0bf5b73a8e1053df88e5494f952d8fe9ccba0ea6b54d397195ba248b5c4090b82857dc1f69d92a7714dc0383e2bb157d0e31cff09c2b98f55761c08cf6d32c9cdb98494d7c56187514597f7bbc438ce3b55fb08d6437746343ebd89aec4a7f863c9865e2b27008bfbc4439a8478292b291ef7979590e0583d607cb899548c98610c645cf5848f1a1ea61277852e44473db56bff0dfd6f6752cf5c30600eeff00000000de8ce0505e8ab69b19fa7067c68a0601eb32e23a79b9fa008fc3e75729acf724096b42a1d484dc5efdb00c39240c0b71b81c7636695a0caae60800008000000000cb788992f654f201817a77dadb046bace09f06666bea92cb87abcd83c41b2db3b402174a7daaba729067ddb040ed96a4a533c600c8eb0042651150a50028bd8618e9f243728b129c4c0b52403edfa4ffa2aa53d4cc45703c0585a625f9e5242159275364a684460d0c076ec6e5c3b0ca1a10dc81c637eb157f32cdb431e829f405694750c3d616910918a51e93bfc3a7bb847709c20765c73895d94ad8747a1a1a5249e045622f5b2edd5add39b7aecbe44d850d8e389074f459c7fb4a2cc16bef0cc1b4d8b01c4a2595499d872595c4183edc0b67c32c177b771221d536b9652a5a3538c334461430149b02412c29131dac1badba1ed40bf544b7982e66373c8c0178f38e2edfcccbefa3ee99440443a21b19a78313d66b7cb3001214ab6307b7609045e35e72d6fcbfeb9080df33ec0c308724b5fc586bb8996320f65cdb9304e2681a63ba391013ac7cdc524fd25482c14b4e88cb2a13ed6543aaaba0c508a8536e50bfb4703f597add132bff712fef0d2d1b831d5801513e"], 0x3be) setsockopt$sock_int(r4, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r4, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r3, @ANYRESDEC=0x0, @ANYRESDEC=r5, @ANYRES64, @ANYRESHEX=r7], 0xffffffffffffffcc) r8 = creat(0x0, 0x0) r9 = getegid() ioctl$TUNSETGROUP(r8, 0x400454ce, r9) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000001800)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x1}, 0x0, 0x0, r9, 0xfffffffffffffffd, 0x10003, 0x9, 0x9, 0x800, 0x4, 0x0, 0x0, 0x3, 0x1f, 0x4, 0x0, 0x4eb, 0x80000001}}, 0xa0) fchown(r0, r7, r9) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$ARPT_SO_GET_ENTRIES(r12, 0x0, 0x61, &(0x7f0000000200)={'filter\x00', 0x72, "e432b2db5cd7376324379eb42d6c1e76e9b08dde4321b23f4ae6db1b49018bd85280761fd1a76c709aee9695389a1eb92a590243e013fc39294b28fe9c9cae8bdde2af8fbe8b7d6b5337265feb212495f724076338f8fd4ba4035a37db056bca0548d3a9d1fbb023f3de10a4bf9c26052969"}, &(0x7f0000000100)=0x96) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 784.330539] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 784.339058] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 784.456401] audit: type=1400 audit(1573846172.375:2151): avc: denied { write } for pid=31792 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 784.510615] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 784.518171] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:32 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r0) [ 784.708561] audit: type=1400 audit(1573846172.635:2152): avc: denied { read } for pid=31786 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 784.771072] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 784.780325] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 784.905424] audit: type=1400 audit(1573846172.835:2153): avc: denied { create } for pid=31786 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000000)=0x0) sched_getparam(r2, &(0x7f0000000040)) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:33 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) pwritev(r0, &(0x7f0000001440)=[{&(0x7f0000000000)="2252df2ce8ad93c5b78dbfd63496ba479dbf02b59b0dafb547b08284c193b2", 0x1f}, {&(0x7f0000000040)="bd4f99dd5efa67e6c1a9a8e830de4fc7ad1bd675c4a4657cf1fbcda7409e25a4bb4fcc19be9e891691a6cb6d1271d460ab2b19ae1954e5a0003610cd45840e9311258b30513d35c3b35115b8ee63ccd5bdba7f71afbb5964ce864af7c910a62f1a208729f694e5c31d5f1e161946e46c2a94616c46da576e800372b8", 0x7c}, {&(0x7f0000000180)="1c915d3939cdb825eaee43b15498ba3942585ac6a245629a859fbcf7d4bc8376b965be6a1e3bf345b79b6e5664cd3e806dadfef7608337a675bd87c2f8743d21de0c19943629a4e097c88d90012f8a137789cee0387b8c4393b0f226ead704b099751cec298fdc78bd218a5363fa95ae07dd4fe521303844fc688f37a74e502cad84cf656001192fa72976a36f955779901589f3c0dd3d14", 0x98}, {&(0x7f0000000240)="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", 0x1000}, {&(0x7f0000001240)="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", 0xfb}, {&(0x7f0000001340)="5c7d510e9ed45cb351c6bb01ae40cc1e39de3ffdd17ac8ea32aa8db824a7523f8d0ecd516380871cec680e6123745bba780744ed62aca524bda56c600d2f810ae2375e7005a1f10c8fe030e180aeb49ea80dca12b16cd4d67a9163dc7cff52d628bc3c8a1c4c1a7da1d250a2c58a5ad243605257e59bbe4bfccb6a4cfdbdd4f7700332a57090bcc05eef9fd0311f877f5895ce916cdb625efe87de106dd5bbf7d57b0ddd01f29b5f10767009bbf7c63f75057e906f7fb7dd6689f348814115aae0fb3faa73013e79d4c639a4467166b1d1fb0ff7e6ae30a6ce53eca78d81ac", 0xdf}], 0x6, 0x40) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:33 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 785.192288] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:33 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r0) [ 785.380753] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 785.601015] audit: type=1400 audit(1573846173.505:2154): avc: denied { create } for pid=31836 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 785.783358] audit: type=1400 audit(1573846173.705:2155): avc: denied { write } for pid=31836 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 785.822174] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 785.829670] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 785.872821] audit: type=1400 audit(1573846173.805:2156): avc: denied { create } for pid=31843 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:33 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) signalfd(r2, &(0x7f0000000000)={0x40}, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 786.109736] audit: type=1400 audit(1573846174.035:2157): avc: denied { write } for pid=31843 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) [ 786.212295] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 786.220365] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 786.227749] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:34 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) ioctl$sock_inet6_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(r4, 0x2403, 0xa8) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 786.550828] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) 19:29:34 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30003, 0xa) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:34 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 786.891745] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 787.050915] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 787.064375] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 787.361296] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 787.368941] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:35 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) 19:29:35 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000040)={0x6, 0x0, {0x57, 0x5, 0x3, {0x0, 0x81}, {0x6, 0x6}, @ramp={0x401, 0x4, {0x0, 0x2, 0x5c4, 0x96}}}, {0x55, 0x5, 0xfff, {0x7e, 0x2}, {0xe7, 0xfffa}, @const={0x7, {0xfff, 0x20, 0x26f9, 0x2}}}}) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 787.692295] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:35 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) timerfd_settime(r3, 0x0, &(0x7f0000000100)={{0x77359400}, {0x0, 0x989680}}, &(0x7f0000000200)) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x338, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x0, 0x14, 0x5a}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0xfd}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r7 = gettid() ptrace$setopts(0x4206, r7, 0x0, 0x0) tkill(r7, 0x3c) ptrace$cont(0x18, r7, 0x0, 0x0) ptrace$setregs(0xd, r7, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r7, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x81, 0x4, 0x20, 0x1, 0x0, 0x1, 0x6a300, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000000), 0xdfea8e9e0739c102}, 0x800, 0x100, 0x5, 0x1, 0x0, 0x5, 0x24}, r7, 0x10, 0xffffffffffffffff, 0x2) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup2(r8, r6) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:35 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 787.810467] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:35 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000080)) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x8000000a, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000002c0)="6653a8990785363940aed12f0000db2f00000022f1f169a4000000000000009f1f8175442ce71022fe50377a22cbccb0353cffd7a7c0c9243fbf0322168078aba9d7ae45b0052772a9567bb821942ce72590f1bf41d20d4c000000279bd612811df1fcaa94a96d58db", 0x69}], 0x4, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r2, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81400) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r3, 0xc018620c, &(0x7f0000000040)={0x3}) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) 19:29:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(0x0, 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 788.212678] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 788.288725] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 788.560766] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 788.568162] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:36 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x20002, 0x0) write$eventfd(r1, &(0x7f0000000000)=0x120000100000001, 0xfffffffe) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/user\x00', 0x2, 0x0) sendfile(r2, r0, &(0x7f0000000080)=0x101, 0x3) 19:29:36 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) 19:29:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(0x0, 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 789.041681] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 789.050355] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) clock_settime(0x5, &(0x7f0000000040)={r2, r3+10000000}) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 789.311061] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 789.324768] audit_printk_skb: 60 callbacks suppressed [ 789.329998] audit: type=1400 audit(1573846177.255:2178): avc: denied { create } for pid=31935 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:37 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:37 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) [ 789.472157] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 789.691717] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 789.707739] audit: type=1400 audit(1573846177.635:2179): avc: denied { dyntransition } for pid=31967 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 789.739223] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:37 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x2000, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 789.914682] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(0x0, 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/109, 0x6d) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 790.007460] audit: type=1400 audit(1573846177.935:2180): avc: denied { create } for pid=31980 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 790.121200] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 790.152959] audit: type=1400 audit(1573846178.085:2181): avc: denied { write } for pid=31980 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 790.311602] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 790.366510] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 790.602020] audit: type=1400 audit(1573846178.535:2182): avc: denied { dyntransition } for pid=31991 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 790.670535] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 790.829489] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:39 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000180)={0x6, {{0xa, 0x4e20, 0x1, @rand_addr="84b65cfb0766849aa486c70ba97e95ff", 0x1}}, 0x1, 0x2, [{{0xa, 0x4e24, 0x8, @local, 0xe52}}, {{0xa, 0x4e23, 0x2, @local, 0x6}}]}, 0x190) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:39 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:39 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = dup(r0) bind$inet(r4, 0x0, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x501041, 0x0) ioctl$FIBMAP(r7, 0x1, &(0x7f0000000040)=0x3fa) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:39 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000540)={0x11c, 0x0, &(0x7f0000000380)=[@register_looper, @reply_sg={0x40486312, {0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x60, 0x18, &(0x7f0000000180)={@fda={0x66646185, 0x4, 0x2, 0x3}, @fd={0x66642a85, 0x0, r3}, @ptr={0x70742a85, 0x1, &(0x7f0000000040)=""/2, 0x2, 0x0, 0x39}}, &(0x7f0000000080)={0x0, 0x20, 0x38}}, 0x400}, @reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50, 0x18, &(0x7f0000000200)={@flat, @flat=@weak_binder={0x77622a85, 0xb}, @fda={0x66646185, 0xa, 0x0, 0x22}}, &(0x7f0000000100)={0x0, 0x18, 0x30}}, 0xe00}, @clear_death={0x400c630f, 0x3}, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x58, 0x18, &(0x7f00000002c0)={@flat=@binder={0x73622a85, 0x44137c104a4f7f78}, @fd, @ptr={0x70742a85, 0x0, &(0x7f0000000280)=""/41, 0x29, 0x2, 0x3f}}, &(0x7f0000000340)={0x0, 0x18, 0x30}}}, @increfs={0x40046304, 0x3}, @acquire_done={0x40106309, 0x1}, @enter_looper, @dead_binder_done], 0x49, 0x0, &(0x7f00000004c0)="eb9fe07f38170743024a9dc63148043f1ca8419fde8f794e27650a8cd83ce1f3cd03a17f95122420b7c8a6e54537d4a2283174a924f0568b3ab9c5d8175667010e0936b92d96d3b520"}) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 791.626627] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 791.657331] audit: type=1400 audit(1573846179.585:2183): avc: denied { create } for pid=32011 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 791.692782] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:39 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 791.780562] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 791.791380] audit: type=1400 audit(1573846179.725:2184): avc: denied { dyntransition } for pid=32013 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 791.847131] audit: type=1400 audit(1573846179.775:2185): avc: denied { write } for pid=32011 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 791.901421] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 791.970735] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x0) [ 792.067163] audit: type=1400 audit(1573846179.995:2186): avc: denied { create } for pid=32034 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:40 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x200000fffffffe, 0xfffffffffffffe52) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 792.182807] audit: type=1400 audit(1573846180.115:2187): avc: denied { write } for pid=32034 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:40 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r3, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(0xffffffffffffffff, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 792.231715] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:40 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) [ 792.390426] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 792.492253] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 792.751087] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 792.831132] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:40 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) fcntl$dupfd(r3, 0x0, r4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:41 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000100)={0x3, 0x7ff, 0x3ff, 0x5, 0x13, 0x5, 0x0, 0x5, 0x7f, 0x94}) ioctl$TCGETS(r1, 0x5401, &(0x7f0000000040)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x5, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$eventfd(r4, &(0x7f0000000000)=0x2, 0x8) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) 19:29:41 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 793.274986] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:41 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x6, 0x222800) dup2(0xffffffffffffffff, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:41 executing program 4: r0 = open(0x0, 0x240a00, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000380)='/dev/keychord\x00', 0x2000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000003c0)={0x40000015}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x1, 0x3, 0x0) ioctl$sock_ifreq(r5, 0x8884, &(0x7f0000000100)={'bpq0\x00', @ifru_flags=0x4000}) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r5, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000780)=ANY=[@ANYBLOB="d4000000", @ANYRES16=r6, @ANYBLOB="000425bd7000fbfc5a8bc9ed54dbdf251200000088000100080003001f000000380004001400010002004e24ac1e00010000000000000000030002000a004e2400000008fe8000000000000000000000000000aa050000004400020008000400800000000800040000000100080002009a0b0000080001000d0000000800040080000000080003000400000008000100020000000800010000000000400007000800010000000000080001000101000008000100256800000c00040002000000000000000c00040005000000000000000c0004000700"], 0xdc}, 0x1, 0x0, 0x0, 0x40004110}, 0x20008010) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000040)={&(0x7f00000004c0)={0x1b0, r6, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x10000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x405}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_BEARER={0x120, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x57}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'eql\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0xffffffff, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2c12, @mcast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfe000000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3f}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdd}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x8}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast2}}}}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x677}]}, @TIPC_NLA_BEARER={0x24, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}]}, 0x1b0}, 0x1, 0x0, 0x0, 0x80}, 0x440068c0) syz_genetlink_get_family_id$net_dm(0x0) r7 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r8 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r8, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r8, r7) write$eventfd(r7, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 793.692643] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:41 executing program 0: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) 19:29:41 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(0x0, 0x0, 0x0) fcntl$dupfd(r3, 0x0, r4) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 794.050520] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 794.058407] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 794.076611] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:42 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r0, &(0x7f0000000140)=0x20008100000002, 0xffffffffffffffd9) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) recvfrom$inet6(r2, &(0x7f0000000180)=""/202, 0xca, 0x40010040, &(0x7f0000000000)={0xa, 0x4e24, 0x4, @mcast2, 0x39291e36}, 0x1c) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 794.271335] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r4, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0xfffffffffffffe1a, r5, 0x10, 0x70bd26, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @udp='udp:syz1\x00'}}, ["", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x20008000}, 0x4004081) dup2(r1, r0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fcntl$setsig(r6, 0xa, 0x13) 19:29:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) 19:29:42 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:42 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/\x02\x00\x00\xff\x00\x00\x00\x00\x80\x00\x00d\x00', 0xe473b33a6ba036f2, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2000007b, 0x1, 0x4d2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0xfffffffffffffec1}}, 0x0) fstatfs(r2, &(0x7f0000000000)=""/150) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 794.741649] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 794.952374] audit_printk_skb: 60 callbacks suppressed [ 794.957609] audit: type=1400 audit(1573846182.885:2208): avc: denied { create } for pid=32125 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 795.118169] audit: type=1400 audit(1573846183.045:2209): avc: denied { create } for pid=32128 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 795.133653] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 795.187306] audit: type=1400 audit(1573846183.115:2210): avc: denied { write } for pid=32125 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) [ 795.281306] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:43 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) write$binfmt_elf64(r2, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x448) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 795.316389] audit: type=1400 audit(1573846183.245:2211): avc: denied { create } for pid=32137 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 795.343190] audit: type=1400 audit(1573846183.265:2212): avc: denied { write } for pid=32128 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 795.421250] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 795.429538] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 795.551262] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 795.581568] audit: type=1400 audit(1573846183.505:2214): avc: denied { dyntransition } for pid=32139 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 795.607550] audit: type=1400 audit(1573846183.505:2213): avc: denied { write } for pid=32137 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 795.633116] audit: type=1400 audit(1573846183.565:2215): avc: denied { read } for pid=32125 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:43 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 795.817668] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:43 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x22ffffffff}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, &(0x7f0000000040)=[{&(0x7f0000000000)="290000002000190f00003fffffffda060200000000e80001dd0000040d000d00ea1100000005000000", 0x29}], 0x1) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:43 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r1, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r2) [ 796.000515] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 796.042053] audit: type=1400 audit(1573846183.975:2216): avc: denied { read } for pid=32137 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 796.309473] audit: type=1400 audit(1573846184.235:2217): avc: denied { create } for pid=32162 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 796.335180] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 796.500619] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 796.521001] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 796.528402] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:44 executing program 4: r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r2 = open$dir(&(0x7f0000000300)='./file0\x00', 0x22000, 0x24) r3 = epoll_create(0x97) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0xeea69c85cb6c80cc, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r9 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/context\x00', 0x2, 0x0) r10 = accept$inet(r0, &(0x7f00000003c0)={0x2, 0x0, @remote}, &(0x7f0000000400)=0x10) r11 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r11, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r12 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r12, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r13 = signalfd4(r12, &(0x7f0000000440)={0x1}, 0x8, 0x80000) r14 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r14, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000900)=ANY=[@ANYBLOB="020300100a00000000000000000000000200060000000000020000007f0000010000000000000800020001000000000000f34700000000000000030000000000000002000000e00000010000000000000000"], 0x50}}, 0x0) r15 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r15, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r16 = fcntl$dupfd(r15, 0x406, 0xffffffffffffffff) r17 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r17, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) r19 = gettid() ptrace$setopts(0x4206, r19, 0x0, 0x0) tkill(r19, 0x3c) ptrace$cont(0x18, r19, 0x0, 0x0) ptrace$setregs(0xd, r19, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r19, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000004c0)={{{@in=@broadcast, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in=@broadcast}}, &(0x7f00000005c0)=0xe8) getresgid(&(0x7f0000000600), &(0x7f0000000640), &(0x7f0000000680)=0x0) r22 = gettid() ptrace$setopts(0x4206, r22, 0x0, 0x0) tkill(r22, 0x3c) ptrace$cont(0x18, r22, 0x0, 0x0) ptrace$setregs(0xd, r22, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r22, 0x0, 0x0) r23 = geteuid() r24 = creat(0x0, 0x0) r25 = getegid() ioctl$TUNSETGROUP(r24, 0x400454ce, r25) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000001800)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x1}, 0x0, 0x0, r25, 0xfffffffffffffffd, 0x10003, 0x9, 0x9, 0x800, 0x4, 0x0, 0x0, 0x3, 0x1f, 0x4, 0x0, 0x4eb, 0x80000001}}, 0xa0) r26 = getpgid(0xffffffffffffffff) r27 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r27, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r27, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r28 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r28, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r28, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r28, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r28, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r30 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r30, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r28, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r28, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3be) setsockopt$sock_int(r28, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r28, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r27, @ANYRESDEC=0x0, @ANYRESDEC=r29, @ANYRES64, @ANYRESHEX=r31], 0xffffffffffffffcc) r32 = creat(0x0, 0x0) r33 = getegid() ioctl$TUNSETGROUP(r32, 0x400454ce, r33) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000001800)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x1}, 0x0, 0x0, r33, 0xfffffffffffffffd, 0x10003, 0x9, 0x9, 0x800, 0x4, 0x0, 0x0, 0x3, 0x1f, 0x4, 0x0, 0x4eb, 0x80000001}}, 0xa0) r34 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r34, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r35 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r35, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r36 = syz_open_dev$evdev(&(0x7f00000006c0)='/dev/input/event#\x00', 0x0, 0xb000) r37 = getpgid(0xffffffffffffffff) r38 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r38, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r38, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r39 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r39, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r39, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r39, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r39, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r41 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r41, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r39, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r39, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3be) setsockopt$sock_int(r39, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r39, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r38, @ANYRESDEC=0x0, @ANYRESDEC=r40, @ANYRES64, @ANYRESHEX=r42], 0xffffffffffffffcc) r43 = getegid() r44 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000700)='/dev/ppp\x00', 0x200000, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4e21}, 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000180)="be761e58e43997045aa0efe280e2ad0bd5d20e2efd876dc776e1f5a33a94aa4ea32396960dfd8e8ff296790e6cc689f163d9f517929bcd9eb857042457622404167f5168669c7213c8a79ec5af4f402604a19731837353dac4d914ae84b9d4cb159d13bbfbe64e05353919486cb9", 0x6e}, {&(0x7f0000000080)}, {&(0x7f0000000200)="2f4432e2b78231d8e089122bf650b835a51baf52cd742fabcc80b62c8f6b369a74d8b5bc625a9fadc5ce93a6196f95702eaef6d46638f5c0d34d9a59884105983e6a75d7a8c758071144fda2cab6824739dcbb35cbf87c4d218ac42e52bbc20aa60819a386f18103b7ab214d65110738e9516ed5b976c2f9ff89964fe8a25fab61ef2f3be9275826ef121c3f7e6f2fce894bd4e4c75877cb58c076c1d2dd5f0144cf7b154ce6a03516befa39e6", 0xad}, {&(0x7f0000000100)="d8a36be04837de6090ddd69dc4225db3e55f36b8d44f4727e618e3e346135b359d7502fb", 0x24}], 0x4, &(0x7f0000000740)=[@rights={{0x28, 0x1, 0x1, [r0, r2, r0, r0, r0, r3]}}, @rights={{0x2c, 0x1, 0x1, [r4, r5, 0xffffffffffffffff, 0xffffffffffffffff, r6, r7, r8]}}, @rights={{0x38, 0x1, 0x1, [r9, r0, r10, r11, r13, r14, r1, r16, r17, r18]}}, @cred={{0x1c, 0x1, 0x2, {r19, r20, r21}}}, @cred={{0x1c, 0x1, 0x2, {r22, r23, r25}}}, @cred={{0x1c, 0x1, 0x2, {r26, r31, r33}}}, @rights={{0x28, 0x1, 0x1, [r1, r34, r35, r1, r0, r36]}}, @cred={{0x1c, 0x1, 0x2, {r37, r42, r43}}}, @rights={{0x14, 0x1, 0x1, [r44]}}], 0x150, 0x22}, 0x4010004) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r45 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r46 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r46, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r46, r45) write$eventfd(r45, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:44 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$netlink(0x10, 0x3, 0x1d) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000000)=0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r5, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r8 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x3f1) sendto$inet(r6, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="2321202e2f66696c65300aea205486396972100d97c042b2cd9252689db19239e8a5606e6635ddee806b5f917ba77a9d73c005f1d65ab06dcefc57551c9d41fbc241e44552829a60768e93d001671f3effb1f1ef2ae12e108339e01432fb49132d56cd027b2e1c17a9f416e5f982e0e6a5627c7c8622d30435d28ff9ac41074a89eb0a605441116a309995c5280c53b4ba8527106e7275ab7b1b7dfc2e916adc640c7a441cb0d319c93a8c46bf6b74171178be3dc9d4069c500000000000a6524126f1fdaf7dd82c4e83ecc7b60600f45e9602e1d2ea4470ece86713678f239e277019b632afc6e09aa720c7620b36940af961f0ccc095ef8ece8377b84cc3b9f26fcd4e9cdf9a941f3d3a1114b5cfa5432d36bbd84a3407c901385764a5697cbd02e5092ccf5a054450daf8a436f2ad8a00076381db30872f54d3d8be1c803cd3f0a3134ec8b4977cdb1f95e90d0294f2d9d53b70c425e0c0b175ffdb8a43ee659f31793971ee7b56b2141f1ea0da7f7bebc0a221234c5cf78bf9edae73082e8c2d16d443d7b0b515d7015bf19b844c202cff07ffff2158bc5e7a51432573c5d5842504bd6ac17200535a53ff3b2c8f6d88eca4a2644ac91970d1ca2db0e6361a19e9606bdaa3892320d499b2a82743d51374c501d8d0cbfa078883e070404db9f62b570ccce8c97b4734affa8da72fe3927026094ddaa41ee7b840ea941c99f795cef5e0b1d1168c2fa632a4105eaf445d0e0cd5248bad0bf5b73a8e1053df88e5494f952d8fe9ccba0ea6b54d397195ba248b5c4090b82857dc1f69d92a7714dc0383e2bb157d0e31cff09c2b98f55761c08cf6d32c9cdb98494d7c56187514597f7bbc438ce3b55fb08d6437746343ebd89aec4a7f863c9865e2b27008bfbc4439a8478292b291ef7979590e0583d607cb899548c98610c645cf5848f1a1ea61277852e44473db56bff0dfd6f6752cf5c30600eeff00000000de8ce0505e8ab69b19fa7067c68a0601eb32e23a79b9fa008fc3e75729acf724096b42a1d484dc5efdb00c39240c0b71b81c7636695a0caae60800008000000000cb788992f654f201817a77dadb046bace09f06666bea92cb87abcd83c41b2db3b402174a7daaba729067ddb040ed96a4a533c600c8eb0042651150a50028bd8618e9f243728b129c4c0b52403edfa4ffa2aa53d4cc45703c0585a625f9e5242159275364a684460d0c076ec6e5c3b0ca1a10dc81c637eb157f32cdb431e829f405694750c3d616910918a51e93bfc3a7bb847709c20765c73895d94ad8747a1a1a5249e045622f5b2edd5add39b7aecbe44d850d8e389074f459c7fb4a2cc16bef0cc1b4d8b01c4a2595499d872595c4183edc0b67c32c177b771221d536b9652a5a3538c334461430149b02412c29131dac1badba1ed40bf544b7982e66373c8c0178f38e2edfcccbefa3ee99440443a21b19a78313d66b7cb3001214ab6307b7609045e35e72d6fcbfeb9080df33ec0c308724b5fc586bb8996320f65cdb9304e2681a63ba391013ac7cdc524fd25482c14b4e88cb2a13ed6543aaaba0c508a8536e50bfb4703f597add132bff712fef0d2d1b831d5801513e141262"], 0x3be) setsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000100)={0x77359400}, 0x10) setsockopt$sock_int(r6, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r6, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r5, @ANYRESDEC=0x0, @ANYRESDEC=r7, @ANYRES64, @ANYRESHEX=r9], 0xffffffffffffffcc) r10 = getegid() setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000040)={r4, r9, r10}, 0xc) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r3, 0xc0506617, &(0x7f0000000200)={{0x1, 0x0, @descriptor="c3fa37396c474088"}, 0xd3, [], "d4af85601e922443a253c96247381ba5ccd85979d9230cf959c93f32bf26df7d840eff87191ba2607cc0cd6fbef1417d53363006b3435a92634d1b0181e49110c93a57f353ee43599b2485a7d9de3f214b6a1f0f3039db433d2c5e37b6f0cb890b56d0b88ed2828e1900780b3634a5607ddda7cc40d1be9c012bbef75a11ae68177ac9570728e77987984d832c81b6c085b2967f75d7df879a756480138fa0eb401c9d8314d2d4cd0a36f95e55830e12ad0efd917788ad82cbab0d03abd950a85bfbf9cb06c0b7022ef0694e0fe8042790a272"}) 19:29:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 796.901507] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 797.171123] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f00000002c0)=@generic={0x1, 0x5, 0x7}) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:45 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:45 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 797.501197] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 797.771770] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:45 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x3, 0x6) syz_genetlink_get_family_id$net_dm(0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r3, r2) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 797.935935] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 798.275582] keychord: invalid keycode count 0 [ 798.289815] keychord: invalid keycode count 0 [ 798.391748] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 798.399165] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:46 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) getpeername(r2, &(0x7f0000000000)=@nl, &(0x7f0000000080)=0x80) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:46 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) memfd_create(&(0x7f0000000000)='/dev/keychord\x00', 0x1) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 798.840668] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 798.858573] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:46 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 798.991106] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:47 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 799.311567] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 799.441002] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 799.449212] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 799.470192] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:47 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:47 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 799.642020] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:47 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000000)=0x1020000100000001, 0xfe77) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) write$selinux_access(r0, &(0x7f0000000180)={'system_u:object_r:lirc_device_t:s0', 0x20, 'system_u:system_r:kernel_t:s0', 0x20, 0x3}, 0x56) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r2, 0x400454d0, 0xd) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 799.892127] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 799.970983] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:48 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r5, 0x4c02, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, 0x10, 0x0, "d3d7b1eb07fb5828960a983f47362f7d58c54e80645afcbca129b7a1bfa8a070a420496d844dd3266799bf2e59c6a4ad4d444a0c2ec3cb24525f2cb8686a71c8", "08e3170eaea4e5f795245253fd9909e840fee2777bc418763628657df4bdb923", [0x80000000, 0x3ff]}) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) sendfile(r0, r6, &(0x7f0000000100)=0x2, 0x9) 19:29:48 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) fsync(r0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 800.151521] audit_printk_skb: 66 callbacks suppressed [ 800.183209] audit: type=1400 audit(1573846188.085:2240): avc: denied { dyntransition } for pid=32282 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 800.220568] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x0) ioctl$UI_DEV_DESTROY(r2, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:48 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:48 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff4000/0xa000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)="ee7e037d31c2865ae918a45a8d9884782b738efc24cee7a9bb5bf0a9b372fe3a6d123c4420437b8624880cbc06e8529b8c5c96fa2592a717c8444aee8c29e53fde01cce9fd090ea600497a808e0953bd7ba7384bee379b35d037d798681eb1ab0857fb154232ca60657af05524264b", 0x6f, r1}, 0x68) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 800.476223] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 800.623919] audit: type=1400 audit(1573846188.555:2241): avc: denied { create } for pid=32297 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 800.711526] keychord: Insufficient bytes present for keycount 80 [ 800.721388] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:48 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x5, 0x450080) dup2(r2, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000580)={&(0x7f00000004c0)={0x2, 0x400000000000003, 0x3, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_key={0x0, 0x8, 0x0, 0x0, "cda82df2a54c843718a23c66b556a8a7fff3ba15e5cb95c4fbafff0bf0622a30bb7331acd7885da3dcb6345fcc1537b5f872c08378f6211696c6887d3d3b1500d3c4aaeb"}, @sadb_address={0x0, 0x0, 0x32, 0x20, 0x0, @in={0x2, 0x4e22, @rand_addr=0x2}}]}, 0xfffffffffffffe71}}, 0x4048080) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)=ANY=[]}}, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000180)={0x0, 0x0, 0x6, 0x0, [], [{0x9, 0x0, 0xc48, 0x4, 0xffffffff}, {0x1, 0x183, 0x80000000, 0x10001, 0x9, 0xa2}], [[], [], [], [], [], []]}) [ 800.774685] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 800.870913] audit: type=1400 audit(1573846188.805:2242): avc: denied { write } for pid=32297 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 800.946048] audit: type=1400 audit(1573846188.875:2243): avc: denied { create } for pid=32307 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 800.980788] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 801.090958] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 801.098356] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 801.133166] audit: type=1400 audit(1573846189.065:2244): avc: denied { dyntransition } for pid=32313 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 801.183432] audit: type=1400 audit(1573846189.115:2245): avc: denied { write } for pid=32307 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 801.385080] audit: type=1400 audit(1573846189.315:2246): avc: denied { read } for pid=32297 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:49 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write$P9_RLOCK(r0, &(0x7f0000000000)={0x8, 0x35, 0x1, 0x3}, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r5, 0x200, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8041}, 0x0) sendmsg$TIPC_CMD_GET_MAX_PORTS(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x940cffed9044fbda}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r5, 0x100, 0x70bd29, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x2000c002) [ 801.520616] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:49 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 801.613205] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 801.767224] audit: type=1400 audit(1573846189.695:2247): avc: denied { create } for pid=32297 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 801.840606] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:49 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 801.881673] audit: type=1400 audit(1573846189.815:2248): avc: denied { dyntransition } for pid=32332 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 19:29:49 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='\x00\x00\x11\x00', 0x20100, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 802.051503] audit: type=1400 audit(1573846189.985:2249): avc: denied { create } for pid=32333 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 802.110414] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x80, &(0x7f0000000180)="96f8cdbf8bec47710f240cdaba39c8738ecdeb9ab90dac95a65a4eca2577eb4fcdba99c0a5becbbc7c5ae00bb3a5522bd73cd7bf5cae3d550288b2b541f88fc1e06700ea8c69a758ae3717494dcea9c381c3b5b71ad1570ff8731ae8c05d808c836e81c233773006a28568a31af896166f72eefe412d7c2b084e2197b04d1262"}) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 802.290623] keychord: Insufficient bytes present for keycount 2 [ 802.305130] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 802.354293] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) renameat(r2, &(0x7f0000000580)='./file0\x00', r5, &(0x7f00000005c0)='./file0\x00') setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r8, &(0x7f0000000540)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000180)={0x378, r9, 0x400, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_LINK={0x30, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NODE={0x14, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xd8, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xaf74}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x211}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x340e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}]}, @TIPC_NLA_BEARER={0xf4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @multicast1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x6, @rand_addr="459c87c72c4c2776bbc56959917100df", 0x4}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff}]}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'bond_slave_1\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xfffffffc, @mcast2}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fff}]}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @broadcast}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0xc39b, 0xa4, @remote, 0x50}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x401, @empty, 0x8001}}}}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MEDIA={0x78, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7da}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5a}]}]}]}, 0x378}, 0x1, 0x0, 0x0, 0x20008040}, 0x20000000) socketpair$unix(0x1, 0x1, 0x0, 0x0) r10 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x400, 0x0) fcntl$lock(r10, 0x0, 0x0) [ 802.664911] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 802.693351] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:50 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x200, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 802.783325] keychord: Insufficient bytes present for keycount 2 [ 802.851163] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:50 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socket$key(0xf, 0x3, 0x2) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:50 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='\x00\x00\x00\x01\x00\x00\x00\x00\x80\x00', 0x80100, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) dup3(r0, r0, 0x40000) sendmmsg(r2, &(0x7f0000000100)=[{{&(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x4e23, @rand_addr=0x6d}, 0x1, 0x4, 0x0, 0x3}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="aa4510a0707320a5876ad7dc8a7acf02f6a0eb0bd85542d4548c79cb767c9bdb4dc598e7dd4db5ac2f2741de853ddde7c40aacb8ef9efb34050d552ab80a195ea3ed4bae4e0c52a6e4f3ef38cc120333522fe15720623e4bb04b52f1ee0f2291d56a4dc1f4554dfd991196580eeb7b97bae58ade84a6ef569a", 0x79}], 0x1, &(0x7f0000000200)=[{0x1010, 0x110, 0x8001, "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"}], 0x1010}}], 0x1, 0x80) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) sched_yield() dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:51 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 803.301903] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:51 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x300000, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000000)={0x18, 0xfffffffffffffff5, 0x8, {0x80000001}}, 0x18) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) r3 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x800) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000000000020000007f00000100000000000000000200010000000000000000000000030000000000000002000000e000000100"/80], 0x50}}, 0x0) recvfrom(r4, &(0x7f0000000100)=""/5, 0x5, 0x20, 0x0, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000180)={'filter\x00'}, &(0x7f0000000200)=0x54) accept(r3, 0x0, &(0x7f0000000080)) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 803.530557] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 803.636809] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:51 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:51 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x3f, 0xffffff85) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 804.150654] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 804.183096] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 804.202306] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 804.311391] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:52 executing program 3: r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:29:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:52 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000880)={{0x7d, @loopback, 0x4e21, 0x2, 'lblc\x00', 0x0, 0x4, 0x7e}, {@rand_addr=0x3, 0x4e24, 0x2, 0x81, 0x2, 0x4b}}, 0x44) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$netlink(r5, &(0x7f0000000080)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x20000008}, 0xc, &(0x7f0000000040)=[{&(0x7f0000000180)={0x510, 0x16, 0x800, 0x70bd2a, 0x25dfdbfd, "", [@generic="9714ac8ff1c106461717a0273d22a90a1c767b19218e390b1d55cadc3768bb3fbda34eaa353d16e37dffb40cbc57744eb84f1174b2c4fcdb3228086ef7992a609d36ae9f4ff2788623dff7d7752a2efe8bcc01686100d58e999e57c0008eef26f9c130eef22359ebe61148a00fc786dc9933281d491c206209ea1d723d473d2058b3b8992b89486192b5a7f62b0f443a93ee95679ac3f800a520df2f1b8edac2c04a8d57ff5c7345827a47acd8cf", @typed={0x14, 0xe, @str='/dev/keychord\x00'}, @generic="2b73b126c6cd9032877368f4a88702f82070e4703493b2ea77f9b0364cdda9333d6786fdf7d27270aac83263e1e518ae03bce1470d82d3f7213ffb79fdd9f7bf502852c9e61298d0dbb974739328f5cfaf873bbe7a0d719c90e20aaad5774029a163c02f166f415920ecede1cca02ac71dcda28570def4fef4e2af08f35eb180abdbd7f8f6f85c6a59c3341d554c0ee214ee7115024df9f6f8b1981dec73e73e15d650025de2b232677a23ff5fa3b4f99590083f860de5b243dcb586eeff317eec1499a5dd70eb5850bd26", @generic="2319636bef65866f06304e797ae745017d3b6a8020aae2897464d1b59993fcd6a9b8ea2b4a19443b8a43d66e15129f420a54393ac435f5829debfd150bd5ee84c3", @nested={0x258, 0x6a, [@typed={0x4, 0x33}, @typed={0x8, 0x88, @ipv4=@loopback}, @generic="e782ad7378935fa17ee800a7edeb62e5910b9c67c6da2941ada60e6aa123ee3cf0844027a21abac555a5a21d697f7d841d1ffa493a2fd7051034bd39d82cf9891d083af523e35b4d8bb69c9243f7cb1ef9ad7482012ce46c3cbfefb0b108102cb52acc7fc7fd64f46b82b7bd79289b0107c3533f0e1051c05a0e1cf25a8c526a23eb1cbe4fbd440037c75ef4b738deb375c324c9304290c14245737f373c260e58a16cc78b78c5951b266c83b6991a8fb478e88c532e71525d6f2f7bc63682880ce35f02fe6f0d59938ac5d0b2ab5c390b6895762ae7b7b62267c8e7ee6c63e17e11a3fff5e7337d1335c2e4442fb7a4", @generic="f82f454d8a966f5aabca8dde1708a5f1bea3addc2fa26c3c1c2c0106daef43f6f3f6f2db0c7a4e09bec8256532fafba442de8a5732fb15723add524ab40980b7c79a0b0e634c579dc38d4defb217d00a7143ea6524e2b968faa05e29f05b8f79e5bd55463c32a3649f4f243ed8a1cca596c2fca5e145337e40d904d1f73f4dfaa8383c70f81c60526644b5e6160e7860e42219bb27389b37be561bbb68da65453cab3d9e11a0618f7cc15abd4e916ac119abdf4b8420f3c51e5b0e341d06b40cc68bbf961ae12a09807228af1cdcad6fe03eec4b5dc544ae45511738df6bbe15c67d226f6cfd48845b60baebe347f01ad853", @typed={0x14, 0x23, @str='systemmd5sum#\x00'}, @generic="34953d14512b4172aa2c928b13aac42ceb37c1a17c0ac3733c40d8054b252648771b4b167a87cc610b057a4f84a342f88c5a5bb497e7a258e95f45b6bf01ee38e871bb5ea11d476d2e766e79bd8f3c0b"]}, @generic="acd5cd976e437143853c241f73234f11720903f2791cf7c524324a528bb10ad0e43d346b71ec3d5388549d1f63c740c27b7f759dc2f301c59dbf7dbbe5c239043508c29a13f91fcb5bf5d410ea4fa5d971155a6920068a2ac73df3d3738d78b7fc06edc345904b874410a477276c3bea47d234d4c3efb3019d99e782a80e29b7df30ed7ef190ada66ce13709d1a3815ccb877d6483c122a6345c3c3b933e6d61a66cb94a1be4a0b0ea29d31df123956ae2be31f56c82b128e72bb904c06ac34ab6fcde7f6fe4fc8a02bb8e70fbaf7343a400", @typed={0x8, 0x62, @fd}]}, 0x510}, {&(0x7f00000006c0)={0x1b4, 0x19, 0x50a, 0x70bd2d, 0x25dfdbfd, "", [@nested={0x18c, 0x10, [@generic="779e9370454a7213b0c258502079fe3e5569fcf9e5542971142df01377f1e304cb888012f6c81e3868fb8e7b72ad7b4a4233460fa9d1574d1d3a820b09d57451d4407a0584781e0184c3f0756f143f0169ebfa17bf6743bdcd2cdc42f8b2661a83a19cb0bfea7291bac2507d7bf9637a38427a6c1034e8cf62efff2c388f24372f40141098acb7e641a3a08d248c0c5cc211c428a122d2c307c3d8fd95518dffcb688565296668c0a4b0482e2c26409b1fee84bdb4029c9253f0ab2c2c7086a0f826dc", @generic="41c1cfb000e088348ede02b9c7fc2ba2ec941de6267b92be87f717ce83449022bf787cc8cd6819c29cc042d84b53f7964b26a9c99ff37ab32da10de2920df7b94c44208797964501abf740816106ad8622785fd5e9a1c73cc514b9dc355e05ebcf78f6b770e9a0d14c989cb22bd8fb550dd5f869e9c764e469daeb607ab43d1f40d00bad778e48c4a72027a2d7e848f6bba33ea9e26499be25b20a6cdd7334b62c67ef187e67f403834a58b80d0d9cfd3efae558e2b344bcbbdffa", @typed={0x8, 0x5c, @ipv4=@rand_addr=0x7}]}, @nested={0x18, 0x33, [@typed={0x14, 0x2e, @str='/dev/keychord\x00'}]}]}, 0x1b4}], 0x2, 0x0, 0x0, 0x40000}, 0x4) syz_genetlink_get_family_id$net_dm(0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r7 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r7, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r7, r6) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 804.501078] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:52 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 804.642109] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:52 executing program 3: r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:29:52 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) sendfile(0xffffffffffffffff, r1, &(0x7f0000000000)=0x80, 0x3) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x5, 0x0, 0x0) [ 804.935666] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:52 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="020300000a0000000000d7d1ac4a0000000000000200060c00e973acd980572e32b3804cdd1bb1fc250000020000007f0000010000000000000000060001000000000000000000000000000300e0000001000000000000000000000000a7db9c0a36d773c9fd22af735471f72ac76cf2ef77bd4b40778ee64ea91f35b10a16445938eef44cf4c6ad7d5c8abaecad43eafc1e5e5dba82ebeedf630453de085d5ba0a168dce3ec139f4a02eeb4005787919da07f3aa4eb5d82715a6ee8872c626bc2f51e4a3d3ad439b2a062b2396789e0d955ebb9efa56463f152212c63277d126c0000000000000000000000000004ddfba81dcab02fc3cd57bb944706f3f5c59ae57a9e2c0e36c8ffae15f442b4c6deed7209ceacd3b241fc0ef15dd43809edb38a01f1246e3c82096bd9003c5184f5ad3c74b983f3ada75f553a4225210cf46341fba0b5d5035711b7b8909c901b0561bfd617eeb9ee6085e595386b5b6bd303a1d1a8c9294c3de89fecd8896350432828cff53fbae3e49a1033cecd83ad669514f0a922f4b927e586258dd74b365c946bc97a11f36ab02f562c34002f5ccfef2cfddd64ae4fc8b7acc5ee030dfe250e57faaa315cd2ed8de3bf21cac42d3492bc683b37b5d5"], 0x50}}, 0x0) fcntl$setstatus(r0, 0x4, 0x2400) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) r1 = syz_genetlink_get_family_id$net_dm(0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14, r1, 0x10, 0x70bd26, 0x25dfdbfb, {}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4ae4c560633aff6c}, 0x4800c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_SET_SWBIT(r6, 0x4004556d, 0xc) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r3, r2) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:52 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42001, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:53 executing program 3: r0 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) [ 805.345688] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 805.591829] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:53 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 805.712966] audit_printk_skb: 84 callbacks suppressed [ 805.718265] audit: type=1400 audit(1573846193.645:2278): avc: denied { read } for pid=32436 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 805.721759] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:53 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 805.851989] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 805.882188] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 805.907812] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 805.933120] audit: type=1400 audit(1573846193.865:2279): avc: denied { dyntransition } for pid=32455 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 19:29:54 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 806.040884] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 806.171306] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 806.250709] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 806.378742] audit: type=1400 audit(1573846194.305:2280): avc: denied { create } for pid=32461 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:54 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r0, 0x10e, 0x8, &(0x7f0000000000), 0x4) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) r3 = socket$inet(0x2, 0x4000020000000001, 0x0) bind$inet(r3, &(0x7f0000000200)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffc6d, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000440)="f4ff753fc7f0c39773264112175e2a10", 0x1a9) socketpair$unix(0x1, 0x40000000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f00000003c0), 0x4) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f00000001c0)='ip6_vti0\x00', 0x1000001d0) sendto$inet(r3, &(0x7f0000000000), 0xfffffffffffffccf, 0x0, 0x0, 0xffffffffffffff37) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc810020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="22acb84f300f6342ddf78fcf5d588ba7d4d1a3b4ab07ed2f96ea386728a360aabb5779f5ce0f1aaa9cf0a25d294a2bf6936f9258dfaf43d4d66172b0f56353f016fbaedf731bca6df49120c70e5b79f62c5c0d73bf004d777c0439feeac8e9601f132175eb9ab137c2009c1b57c5d8fdebde0f54a8196cb2a1045ffc4f3ec9d351102cac31e5c0c8d15f6717a9d6354bdb3270af4882b2c329be5e1d2e683406096b057bd0", @ANYRES16=r13, @ANYBLOB="f31c2cbd7000fbdbdf250d000000380002000800080080000000080005009906000014000100317a23f10a22fa36eba8393d8b528bdf46f91448d92e8688da770cb00124336608000d0000000000080002004e23000024000200080007000300000008000e004e24000008000d000000e0ff07000d00020000000800760000f8fffffea7b633d4b56fbad808530c947923"], 0x78}, 0x1, 0x0, 0x0, 0x4002014}, 0x1000) sendmsg$IPVS_CMD_GET_CONFIG(r12, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="4c255c18", @ANYRES16=r13, @ANYBLOB="00012abd7000fedbdf250d0000001800010014000300ffffffff00000000000000f7ae000000"], 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x5) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 806.408118] audit: type=1400 audit(1573846194.335:2281): avc: denied { dyntransition } for pid=32464 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 19:29:54 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 806.492168] audit: type=1400 audit(1573846194.425:2282): avc: denied { create } for pid=32436 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:54 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 806.581089] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 806.621032] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 806.665172] audit: type=1400 audit(1573846194.595:2283): avc: denied { write } for pid=32461 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:54 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="023900000a00000000000000000000000200060000000000020000007f00000100000000000000000200010000000000000000000000000003000066f7b3837505f51bef000000000002000000e0000001000000fcffffff00"], 0x50}}, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x800, 0x0) splice(r2, 0x0, r0, 0x0, 0x97f, 0x10) syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = syz_open_pts(0xffffffffffffffff, 0x103000) sendfile(r5, r4, &(0x7f0000000000)=0xfffffffffffffeff, 0x7fff) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) init_module(&(0x7f0000000100)='/dev/full\x00', 0xa, &(0x7f0000000200)='\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 806.811203] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 807.021804] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 807.073876] audit: type=1400 audit(1573846194.995:2284): avc: denied { dyntransition } for pid=32482 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 19:29:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) 19:29:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:55 executing program 3: r0 = syz_open_dev$loop(0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:55 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 807.295191] audit: type=1400 audit(1573846195.225:2285): avc: denied { create } for pid=32488 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:55 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x400, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$FUSE_OPEN(r4, &(0x7f0000000200)={0x20, 0x0, 0x5, {0x0, 0x4}}, 0x20) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffff8) r6 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r6, 0xe}, &(0x7f0000000500)=ANY=[@ANYBLOB="656e633d6f61657020686173683d7368613531322d61767832000026f3a06772000000000000e6ffffffffffffff0000000000000000000000000000000000af00000000000000000000000000008a7608e38e74f69f707dd02d0fc6d0cbe581f2f0e5c2e2d26c"], &(0x7f00000001c0)="772724d4ac2b107bc7befd976d50", 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000080)='cifs.spnego\x00', &(0x7f0000000100)=@chain={'key_or_keyring:', r6, ':chain\x00'}) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 807.352601] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 807.532030] audit: type=1400 audit(1573846195.465:2286): avc: denied { write } for pid=32488 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 807.571362] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 807.579046] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 807.820517] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 807.863688] audit: type=1400 audit(1573846195.795:2287): avc: denied { create } for pid=32504 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 808.031559] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:56 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='t\x8e\x00\x00/kdyW\x1bord\x00', 0x60000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 808.161171] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:56 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$eventfd(r4, &(0x7f0000000140)=0x81, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x4, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 808.420481] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:56 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 808.702273] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 808.860554] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 808.868575] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:57 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x48000020}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='F\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="00032bbd7000ffdbdf25130000003c00090008000100060000000800010002000000080002000900000008000200000000000800020000000000080002007800000027000200e800000028000200080001000300000004000400080001000400000008000100c80000000800020081000000"], 0x3}, 0x1, 0x0, 0x0, 0x4068194}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:57 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:57 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) sched_getparam(r2, &(0x7f0000000000)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(0x0, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 809.292479] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 809.303650] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:57 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGBITSW(r4, 0x80404525, &(0x7f0000000000)=""/127) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:29:57 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 809.731609] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:57 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0xffffffffffffff53) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:29:57 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fcntl$getown(r2, 0x9) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:57 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) [ 810.045066] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 810.381091] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 810.388739] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 810.580908] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:58 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(r3) 19:29:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 810.732428] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 810.739824] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:58 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:29:58 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = accept4(r0, &(0x7f0000000180), &(0x7f0000000200)=0x80, 0x800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendfile(r1, r2, &(0x7f0000000280)=0x8, 0x1) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_inet_SIOCSIFADDR(r7, 0x8916, &(0x7f0000000100)={'sit0\x00', {0x2, 0x4e21, @broadcast}}) r8 = fcntl$dupfd(r5, 0x0, r6) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$TIOCLINUX5(r5, 0x541c, &(0x7f0000000040)={0x5, 0xfffffffffffffffd, 0xff, 0x7}) ioctl$TCSETA(r8, 0x5406, &(0x7f0000000000)={0x1, 0x84b, 0x9, 0x7, 0xe, 0x1, 0x5, 0x1f, 0x0, 0x4}) socketpair$unix(0x1, 0x0, 0x0, 0x0) r9 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x20, 0x0) ioctl$PERF_EVENT_IOC_RESET(r9, 0x2403, 0x80000001) [ 811.001019] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 811.100952] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r3) [ 811.255600] audit_printk_skb: 54 callbacks suppressed [ 811.282052] audit: type=1400 audit(1573846199.185:2306): avc: denied { dyntransition } for pid=32609 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 811.360533] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 811.372945] audit: type=1400 audit(1573846199.305:2307): avc: denied { create } for pid=32585 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychor\x00', 0x56000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:29:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 811.504820] audit: type=1400 audit(1573846199.435:2308): avc: denied { create } for pid=32615 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:29:59 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r4 = dup3(r2, r3, 0x80000) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, r5, &(0x7f0000000080)={0x40000002}) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x400) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x238) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x92, &(0x7f0000000180)={@dev={[], 0xf}, @link_local, [], {@ipv4={0x800, {{0x1f, 0x4, 0x1, 0x1f, 0x84, 0x68, 0xfff9, 0x9, 0x2e, 0x0, @empty, @multicast1, {[@generic={0x82, 0x8, "da8f42b87690"}, @lsrr={0x83, 0x13, 0xf9, [@local, @remote, @dev={0xac, 0x14, 0x14, 0x2a}, @empty]}, @generic={0x82, 0x8, "d73da2d0bcf9"}, @timestamp={0x44, 0x30, 0x8, 0x1, 0x3, [{[@rand_addr=0xffff], 0x5}, {[], 0x80000001}, {[@rand_addr=0x3], 0x6}, {[], 0x13}, {[@multicast1], 0x9}, {[], 0x3}, {[@broadcast], 0x80000001}]}, @ra={0x94, 0x6, 0xa824}, @ssrr={0x89, 0x7, 0x1f, [@dev={0xac, 0x14, 0x14, 0x14}]}, @ra={0x94, 0x6, 0x7fffffff}]}}, @icmp=@info_request={0xf, 0x0, 0x0, 0x401, 0x20}}}}}, &(0x7f0000000040)={0x1, 0x2, [0x2a0, 0xfcd, 0x413, 0x5ea]}) [ 811.549776] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 811.689975] audit: type=1400 audit(1573846199.615:2309): avc: denied { write } for pid=32615 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 811.720778] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:29:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r3) [ 811.733319] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 811.881351] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 811.994162] audit: type=1400 audit(1573846199.925:2310): avc: denied { create } for pid=32631 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:00 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 812.131993] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 812.161729] audit: type=1400 audit(1573846200.085:2311): avc: denied { dyntransition } for pid=32634 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 812.186897] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 812.218950] audit: type=1400 audit(1573846200.145:2312): avc: denied { write } for pid=32631 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 812.219259] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r3 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) close(r3) 19:30:00 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socket$netlink(0x10, 0x3, 0x10) r2 = accept4$packet(r1, &(0x7f0000000800)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000840)=0x14, 0x80000) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000080)=0x3, 0xfffffffffffffec0) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x100, 0x0) ioctl$UI_SET_PHYS(r3, 0x4008556c, &(0x7f0000000040)='syz1\x00') [ 812.455158] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:00 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2a0102, 0x0) connect$unix(r0, &(0x7f0000000180)=@file={0x0, './file0\x00'}, 0x6e) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='\xfa\x19uZ\xd8\xbf\x90b\xef)\x00\x00\x00\xfb', 0xa0800, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) mknodat(r5, &(0x7f0000000080)='./file0\x00', 0x4001, 0x0) dup2(r2, r1) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x401, 0xffffffffffffff24) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 812.608272] audit: type=1400 audit(1573846200.535:2313): avc: denied { create } for pid=32649 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 812.669936] audit: type=1400 audit(1573846200.595:2314): avc: denied { read } for pid=32631 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 812.733703] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 812.792063] audit: type=1400 audit(1573846200.725:2315): avc: denied { write } for pid=32649 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:00 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(0xffffffffffffffff) [ 813.071551] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 813.078947] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 813.114961] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:01 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:01 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) pwritev(r5, &(0x7f0000001400)=[{&(0x7f0000000180)="8b0ca107bf6675868c7c4a0222fcf8a139a577eb3b645862807ea7abde4185e836b803073f3f5b07f41c353ab84faf3643dc87f008ba7e12561008b07fbed25121b33b3eee590a745c9b29a2bff5cb68808e94623cfb88c0fb126991d4006b9682d1cce7eaabdfdcffd86f26ef372ed6f84e6fdf09511e7afcd064bf887e21ec381b6e11b3d566cdc5b0d25b4e19e450907f3925b3284dde876926840b923e9a5b331b2174976d3e1985a0f6f67239da0aa7c806d52b60e1ac7b7265514306f6d54a73", 0xc3}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="784e86ae7fd4e06749e144ab56280137f16459481b5e54e9cc51d8f29987c8f7e84c4812089f64d18edb8cbef0ca8508d3aac4168448a00015b2b4b7047bfa2475f1c05cd0a7464797cc9c8eb8a4a5", 0x4f}, {&(0x7f0000001300)="82cd2bb5c19ec2a7599d755abac702b410ad9b6baf3d80bfbb661b6805b38c9ae6e52176c563f969f73bcf9445e4645c81e71d3fbe21484599e523b634d1f0d4b1a2503206baade06dba0a8f5971c0a5ea7a0be215d2a9a8ff581fc28efa625f3fbf0f10294f088f7f32efbe7ec6dcf3d62b46a67c698123c123249f1326076bedaf0cf3401e3c76", 0x88}, {&(0x7f0000000100)="eeba1821697688c08047bb123a09b3df994c17f3a62274", 0x17}, {&(0x7f00000013c0)}], 0x6, 0x80000001) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 813.460088] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:01 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x308141, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) finit_module(r0, &(0x7f00000001c0)='\x00', 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGPKT(r5, 0x80045438, &(0x7f0000000180)) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = fcntl$dupfd(0xffffffffffffffff, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$UHID_INPUT2(r7, &(0x7f0000000240)=ANY=[@ANYBLOB="0c0d00006e004ca16b120a314e6c1d6f42f68526fbe16265fd37a6387110970831e5eadfd18f2c2d964139feaee0fb2b1bcb83b285148444cb9c784ce5dd15b092ae65ad0225daf47fb15a01a1ef84fa380689b6a33fe3aed65906bc9d68ce756ce56b7d9362ae88083c7daf879bf7a4295ee4ae4553ecbbe0"], 0x74) socketpair$unix(0x1, 0x0, 0x0, 0x0) r8 = socket$packet(0x11, 0x9e1340f07735568c, 0x300) r9 = socket$key(0xf, 0x3, 0x2) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r12, 0x40082406, &(0x7f0000000200)='\x00') write$FUSE_GETXATTR(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x2, {0x6}}, 0x18) sendmsg$key(r9, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000000000020000007f000001000000000000000002000100000000000000000075cb57bfcef186690000000002000000e00000010000000000000000"], 0x50}}, 0x0) sendfile(r8, r9, &(0x7f0000000080)=0x2, 0xd5) r13 = socket$inet6_tcp(0xa, 0x1, 0x0) r14 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r15 = fcntl$dupfd(r13, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r15, 0x8912, 0x400200) getsockopt$inet6_opts(r15, 0x29, 0x37, &(0x7f00000002c0)=""/87, &(0x7f0000000040)=0x57) 19:30:01 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(0xffffffffffffffff) [ 813.716472] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 814.021690] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 814.040341] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:02 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x98500, 0x4) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.net/syz1\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, r2) execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000080)=']wlan1[mime_typewlan0\x00', &(0x7f0000000100)='/dev/keychord\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='proc\x00', &(0x7f0000000200)='/dev/keychord\x00', &(0x7f0000000240)='trusted\x00', &(0x7f0000000280)='/dev/keychord\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='/dev/keychord\x00'], &(0x7f0000000440)=[&(0x7f00000003c0)='/dev/keychord\x00', &(0x7f0000000400)='/dev/keychord\x00']) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000100)) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r2, 0x891c, &(0x7f0000000040)={'bond_slave_1\x00', {0x2, 0x4e21, @loopback}}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) pipe(&(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 814.214553] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:02 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$UI_DEV_DESTROY(0xffffffffffffffff, 0x5502) ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) close(0xffffffffffffffff) [ 814.350603] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 814.430594] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 814.590737] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:02 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 814.871589] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 814.906664] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:02 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x81000) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000280)=""/234) syz_genetlink_get_family_id$net_dm(0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e21, 0x20, @rand_addr="dcafcbb819f95c8cff82e76ed9480baa", 0x22d}}, 0x0, 0xf001, 0x0, "085677c78198e7df0021cd17d5f6447795e4a226a673ce85680336be2e6980feea182f2f9cf5b08201768e6ad3f740b163993522848637ed66842c6eb57c7a0615cd37de3920b5c84772336d47867bfb"}, 0xd8) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/nev/chord\x00', 0x101000, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:02 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={0x14, 0x4000080000002, 0x1, 0xfffffffffffffffd, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) 19:30:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 815.107739] keychord: invalid keycode count 0 19:30:03 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = dup3(0xffffffffffffffff, r1, 0x80000) ioctl$TIOCEXCL(r2, 0x540c) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x2ccbc39a9f242937, 0x0, 0x0) [ 815.171937] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 815.426433] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 815.641414] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0xffffff5e) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = add_key(&(0x7f0000000000)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000180)="67d3805d836433e95986a81b55ba74c1ecb4214e29a336cd32f71b1d33d8eb7aec25b350d208f99b2a73c793bbd45c1d505b049db99f25d229cb54d428fdcfd2145769bc7b92c74117605370c5799ccdb03aff125d4dbea89f4a157d8397b942efe36260f65157b62a3b932069f79b35df0116fc32ecc4c409ff6ef39444c3ce5bdf1f6170e26b389f29ca3880d40504a15fa3dc32b4727e8ee5e5de5decd18ed8d5a34709a02066350a103ab2f86b7b842b5a10ce3e", 0xb6, 0xfffffffffffffff8) r3 = add_key(&(0x7f0000000540)='id_legacy\x00', &(0x7f0000000580)={'syz', 0x2}, &(0x7f00000005c0)="46b9ef7d5b7315c31d71797ba5f6643d3cb50ac53fc87f78ce06387940722c8eb6c0c40bb80d234e068ca07855fdf31dce427338ef059016f8d65f24c4a3ed268897016fba5dba95de29e157d9b593feb3ec70ef6781c9e918e5ed1b3e7c4d9d63f4dec48bbdaeb8f3cbf8f8b474b4c68dc4a19dc73cc42f177182c93d6bf46e61871acce3216987abc9cd0ccd00eb1019cc8234327b0ca96848fdaab4e6", 0x9e, 0xfffffffffffffffb) keyctl$instantiate_iov(0x14, r2, &(0x7f0000000100)=[{&(0x7f0000000240)="3948d22d8028ffeea35d2bc9a1548435cbb156ed07f04eb888634944a794f7028449c100b7db57d3dfcdbe2ff20466e8d45d65f608401299f1ac72c4877f78c063bf1d1f9fc23698793e64f968df29853d35cacda1e5250e41abf99f0199547ed92c5db304d198b9e9a6579cc1f0e435d7", 0x71}, {&(0x7f00000002c0)="d04e30fd4142130f9ee3dbc85fcc79c522d36ce43eeb127b86050cf5207361978e9ce927bf4db7295ef129222a9070da874acc40f02a2f59ec27b9d9f1c73089d53e12277700f9f7ebd645e1589e2b8595e2e5a1f37e9ada5242b8c017c0f3ad76725d8bfd986170ae645995ae1912c99b125db6175be28ff4d88d624bd262eb2102317363be2b4b7b6a7aefb9ff2192c00181d31883c65c0572a756aa742f37d4c3ae7fdc00cad444feec794cad25d8a2174068faac408a02b742cc34107644543b37ab7e11f7", 0xc7}, {&(0x7f00000003c0)="ee12045c178749b5b979fb40d820a05e2f4c5a033a05f16a395626e99514846bb01628df16de4fb770c6121ce08368be37b174f6ab3ea25b6e287d70e4031e5d0baa771f76d96a8fb26f6c26a8642d7ce671a468a12b3133d75fe1c0869d31edd88d53a4d79580e723924215082cea4aa54b705334a7a7b942e75e23021bd4d84c6c2ac4d02a24ffb2dabb32d455143c314a7e113d5058bfae3a761b7b6aad6799227d9253bbef8ed3b0fcc312fe3e5f9f58a70b66d1713b5c73339af29cd2e3bcf0c24123baa14c3dc593cdb5c6815b6c90ebecece657c901f0c6adc7892b6152c6b71b56", 0xe5}, {&(0x7f00000004c0)="ed78b85cd4d0d8e65e8f557f62985630fd254658981119db8de5133db097ab894547e63109632bcc114823d39addea7577a4c7bae7f5ba88d068952d31bb2df158dcb351b2366808a17bc87fcd1dce9e6ff9295b61871860c1bbfb36f76319f92e4ef53ca0d6088546df08dc157f1a7d28a31bde", 0x74}], 0x4, r3) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:03 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:03 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 815.956014] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 816.070599] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:04 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_WIE_OFF(r4, 0x7010) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x96, 0x4, 0x2, 0x0, 0x80000001, 0x8, "6b58b53ac2430287d4bd87f3fa97a570efc057d282585636623f844670bfa79c6b72349d29d30d9686e1773c6d0681cf791ac094cade81c7fb4b5bcf91b2a59f5a50e5a3957ceb96b9a54d3d6dd1121487db6df3c6ee14124f3a071cffd8b2d26dd42c10a3e52fd7ca4fa3c4d81fdd417cae9196985f71d4d2abf465549b0d1ea5d83d07c40fabbdb1c38ff4f14afe5484ae103c76e0"}, 0x1ae) [ 816.216263] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:04 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) socketpair(0x1, 0x80000, 0x8, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setflags(r2, 0x2, 0xbe880c3d786b6cad) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair(0x8, 0x800, 0x5, &(0x7f0000000040)) 19:30:04 executing program 0: perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x2102, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(0xffffffffffffffff, 0x0, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = gettid() lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:dpkg_lock_t:s0\x00', 0x21, 0x3) r2 = memfd_create(&(0x7f0000000080)='#em3#/\x00', 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x7fffffd}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) fsetxattr$security_smack_transmute(0xffffffffffffffff, 0x0, &(0x7f0000000280)='TRUE', 0x4, 0x7) ptrace(0x10, r1) write$P9_RSTATFS(r3, 0x0, 0x0) io_setup(0x0, 0x0) [ 816.354097] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 816.384229] audit_printk_skb: 75 callbacks suppressed [ 816.389465] audit: type=1400 audit(1573846204.315:2341): avc: denied { create } for pid=32756 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 816.591425] audit: type=1400 audit(1573846204.525:2342): avc: denied { write } for pid=32756 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 816.617527] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 816.630850] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 816.801027] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 816.836903] audit: type=1400 audit(1573846204.765:2343): avc: denied { create } for pid=304 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 817.023962] audit: type=1400 audit(1573846204.955:2344): avc: denied { write } for pid=304 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:05 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 817.102095] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 817.109655] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 817.142235] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 817.310618] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:05 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fcntl$dupfd(r3, 0x0, r4) r5 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x7, 0x44240) dup2(r2, r5) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 817.405441] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 817.573095] audit: type=1400 audit(1573846205.505:2345): avc: denied { create } for pid=329 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 817.574645] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 817.607567] audit: type=1400 audit(1573846205.535:2346): avc: denied { read } for pid=304 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:05 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = getpid() fcntl$setown(r0, 0x8, r3) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 817.787422] audit: type=1400 audit(1573846205.715:2347): avc: denied { write } for pid=329 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 817.890773] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 817.975436] audit: type=1400 audit(1573846205.905:2348): avc: denied { create } for pid=304 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 818.071329] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:06 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) recvfrom(r2, &(0x7f00000001c0)=""/170, 0xaa, 0x2001, &(0x7f0000000280)=@ax25={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x2}, [@default, @null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @default, @null, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}]}, 0x80) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x1) sendmsg$key(0xffffffffffffffff, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000000000020000007f000001080000000000000002000100000000000000000000000000030000000000000002000000e00000010000000000000000"], 0x50}}, 0x0) readahead(0xffffffffffffffff, 0x7, 0x4) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup(r3) [ 818.211590] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 818.261384] audit: type=1400 audit(1573846206.195:2349): avc: denied { read } for pid=329 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 818.350550] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:06 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 818.481293] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 818.581084] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 818.699641] audit: type=1400 audit(1573846206.625:2350): avc: denied { create } for pid=369 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 818.761598] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 818.805409] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 819.040548] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 819.047945] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 819.171085] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 819.251007] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:07 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x1ee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = timerfd_create(0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)={0x20000001}) dup3(r2, r1, 0x0) 19:30:07 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:07 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fcntl$setsig(r2, 0xa, 0x2a) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/mls\x00', 0x0, 0x0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) mremap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f0000ffc000/0x3000)=nil) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r1, 0x0, 0x48a, &(0x7f0000000100)={0x4, 0x8, 0x9}, 0xc) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$key(0xf, 0x3, 0x2) r4 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x28202) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r4, 0x8918, &(0x7f0000000280)={@ipv4={[], [], @remote}, 0x65, r5}) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}, @sadb_sa={0x2, 0x1, 0x4d5}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @local}}]}, 0x50}}, 0x0) fcntl$lock(r3, 0x0, 0x0) 19:30:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:07 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) recvmmsg(r1, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/187, 0xbb}, {&(0x7f0000000180)=""/254, 0xfe}, {&(0x7f0000000100)=""/44, 0x2c}], 0x3, &(0x7f00000002c0)=""/126, 0x7e}, 0x40}, {{&(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/105, 0x69}, {&(0x7f0000000440)=""/150, 0x96}], 0x2, &(0x7f0000000540)=""/122, 0x7a}, 0x80}, {{&(0x7f00000005c0)=@caif, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)=""/229, 0xe5}, {&(0x7f0000000740)=""/60, 0x3c}, {&(0x7f0000000780)=""/171, 0xab}], 0x3, &(0x7f0000000880)=""/68, 0x44}, 0x2}, {{&(0x7f0000000900)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000980)}, 0x3}, {{&(0x7f00000009c0)=@caif, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000000a40)=""/90, 0x5a}, {&(0x7f0000000ac0)=""/120, 0x78}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/81, 0x51}], 0x5, &(0x7f0000002c40)=""/77, 0x4d}, 0xd6c}], 0x5, 0x11, 0x0) write$binfmt_elf64(r2, &(0x7f0000002e00)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x9, 0x7, 0x5, 0xffff, 0x5, 0x532be0a7a77fc55d, 0x2, 0x33b, 0x40, 0x2fb, 0xffffff81, 0xff, 0x38, 0x2, 0x8, 0xff81, 0x80}, [{0x7, 0x4, 0x10001, 0x80, 0x4, 0x2, 0x10001, 0x9}], "5b08bdc7ee7fdb5a39da1aa8590d157e4bdea835f67f342fe87b738d8843158a542349943ca2b87b2203a05d58c3ba09808a995dad66b5961206705b98a9b551e600aace70c9c800dab50198480a7a053831822ce3bb29d133a30553ae3dde13ed721e6f0fb3e06c503469e3a4c57a8f6fdcb5c6cec7df05b0a3933e8786c95eb8", [[], [], [], [], [], [], []]}, 0x7f9) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r5, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r8 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r6, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3be) setsockopt$sock_int(r6, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r6, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r5, @ANYRESDEC=0x0, @ANYRESDEC=r7, @ANYRES64, @ANYRESHEX=r9], 0xffffffffffffffcc) r10 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003600)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) write$P9_RSTATu(r0, &(0x7f0000003700)={0x83, 0x7d, 0x2, {{0x0, 0x5e, 0x9, 0x3dcd, {0x80, 0x3, 0x5}, 0x3140000, 0x6, 0x0, 0x1e4a, 0xe, '/dev/keychord\x00', 0x4, '^+%\xf7', 0xe, '/dev/keychord\x00', 0xb, '\'$+GPL+ppp1'}, 0x10, '$em1@em0md5sum[*', r9, r10, r11}}, 0x83) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:07 executing program 0: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local, @broadcast=0xe0000001}, @icmp}}}}, 0x0) faccessat(0xffffffffffffff9c, 0x0, 0x24, 0x0) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x800e00516) [ 819.732985] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 819.790345] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 820.040556] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:08 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, 0x0, 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:08 executing program 4: open(0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000400200060000000000020000007f000001000000000000000002000100000000000000000000000000030000000000000002000000e00000010000000000000000"], 0x50}}, 0x0) r1 = geteuid() r2 = creat(0x0, 0x0) r3 = getegid() ioctl$TUNSETGROUP(r2, 0x400454ce, r3) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000001800)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x1}, 0x0, 0x0, r3, 0xfffffffffffffffd, 0x10003, 0x9, 0x9, 0x800, 0x4, 0x0, 0x0, 0x3, 0x1f, 0x4, 0x0, 0x4eb, 0x80000001}}, 0xa0) fchown(r0, r1, r3) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30001, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$selinux_attr(r7, &(0x7f0000000040)='system_u:object_r:policy_src_t:s0\x00', 0x22) r8 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r8, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, &(0x7f0000000000)=0x8, 0x4) dup2(r8, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:08 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r0, 0x0, 0x4a, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfd31c70e, 0x0, 0x0, 0x800e0059e) shutdown(r0, 0x0) [ 820.432200] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 820.439601] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 820.631484] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:08 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:30:08 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) socket$packet(0x11, 0x2, 0x300) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000001080)=@pptp={0x18, 0x2, {0x1, @empty}}, 0x80) bind(r3, &(0x7f00000002c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x2, 0x2, 0x2, 0x3, {0xa, 0x4e23, 0x2, @loopback, 0x8}}}, 0x80) write(r1, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000400)=0xffffffffffffffff, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) write$cgroup_int(r0, &(0x7f0000000180)=0x7, 0x396) r4 = socket$inet6(0xa, 0x400000000001, 0x0) getrlimit(0x2, &(0x7f0000000240)) r5 = dup(r4) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r5, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x14) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000001100)=ANY=[@ANYBLOB="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"], 0x30e}}, 0x1) ioctl$FS_IOC_SETFLAGS(r5, 0x40046602, &(0x7f0000000640)=0x1) r7 = inotify_init() lseek(r7, 0x4, 0x4) ioctl$UI_SET_SNDBIT(r5, 0x4004556a, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x581, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x100000031, &(0x7f0000000140)=0x8, 0xfd73) recvmsg(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0xfffffffffffffe14, 0x0, 0x0, &(0x7f0000000040)=""/36, 0x24}, 0x2002) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3}) fcntl$dupfd(0xffffffffffffffff, 0x0, r8) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$TCSETSW(r9, 0x5403, &(0x7f0000000340)={0x3f, 0x0, 0x0, 0x1, 0x16, 0x1, 0x0, 0x0, 0x8000, 0xbb4, 0x2}) getsockname(r9, &(0x7f00000001c0)=@rc, &(0x7f0000000580)=0xfffffffffffffefb) r10 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r10, 0x6, 0x210000000013, &(0x7f0000000040), 0x4) r11 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r12 = dup2(0xffffffffffffffff, r11) sendmsg$netlink(r12, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000100)=ANY=[@ANYRES32=r11], 0x4}, 0x0) r13 = socket$inet6(0xa, 0x1000000000002, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = dup2(r14, r13) r16 = syz_open_dev$loop(0x0, 0x0, 0x105082) r17 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r16, 0x4c00, r17) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x100000001) r18 = syz_open_dev$loop(0x0, 0x0, 0x105082) r19 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) ioctl$LOOP_CHANGE_FD(r18, 0x4c00, r19) fallocate(r18, 0x0, 0x0, 0x100000001) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r21 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev&net/tdn\x00', 0x400000, 0x0) ioctl$TUNSETIFF(r21, 0x400454ca, &(0x7f0000000040)={'vxcan1\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r22, 0x2, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r21, &(0x7f0000000180)}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) dup3(r20, r21, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r23 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev&net/tdn\x00', 0x400000, 0x0) ioctl$TUNSETIFF(r23, 0x400454ca, &(0x7f0000000040)={'vxcan1\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)=0x0) io_submit(r24, 0x0, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) r25 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r25) sendmsg$netlink(r15, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000600)=ANY=[@ANYRESHEX=r16], 0x12, 0x80}, 0x0) setsockopt$inet_tcp_int(r15, 0x6, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r27 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev&net/tdn\x00', 0x0, 0x0) ioctl$TUNSETIFF(r27, 0x400454ca, &(0x7f0000000040)={'vxcan1\x00', 0x10005812}) io_setup(0x20000000002, 0x0) io_submit(0x0, 0x0, 0x0) r28 = dup3(r26, r27, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r28, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, 0x0) r29 = openat$tun(0xffffffffffffff9c, 0x0, 0x400000, 0x0) ioctl$TUNSETIFF(r29, 0x400454ca, &(0x7f0000000040)={'vxcan1\x00', 0x10005812}) io_setup(0x20000000002, &(0x7f0000000240)) io_submit(0x0, 0x2000000e, &(0x7f0000000080)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='\f', 0x1}, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) r30 = dup3(0xffffffffffffffff, r29, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r30, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR(r30, 0x6, 0x13, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x12, &(0x7f0000000380)=0x83, 0x9) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x20000008, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback, 0x200}, 0x1c) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000280)='syz_tun\x00', 0x10) r31 = open(&(0x7f0000000480)='./bus\x00', 0x101042, 0x1) ftruncate(r31, 0x2007fff) sendfile(r5, r31, 0x0, 0x8000fffffffe) [ 820.876047] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 820.958554] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 820.978724] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:09 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCGDEBUG(r4, 0x80047441, &(0x7f0000002400)) vmsplice(r0, &(0x7f0000002340)=[{&(0x7f0000000180)="7582c3d7044fcf61e7fb6fe404b449adb2b99062b688bd9b4829207e9bd8a9c06ce4625bfbd6ffd7000b98ab326692b08579f56c2b7929c648949ff817c8304f65b451d2423b49c998705241ba68fa0c8245b61457bd97aa1d4500cca05ba8b8dc2746a1393dd2ecd2990e08806d7e96dd4073c3a3ed7b182cd995691cbdbc667b18e1a9ee6e335b197f9ed3ab974b5b29020b5fd6c45a30613b10a5ea874ea3e3dbbf25f3b41d6c2f0c2ecb593e4892874f872e9a799df7e3cad689e4cb98248ab1e324b842925f1964d6a23d9d3a65c664cf981f80ecc104e69f66675bae327100e7578d79327dafcd3028a8adb0fd5a0b0f70d7304464ee9b81bd73607be91009e88370f975a5e7df4c75d7405ff503e467d26b7321f65823bd3c09ee6d3806d6ec4cb227cc5e3dfc6cda26ea959150e2786735473ac16329988309d604c6605f1ec24cb1b3aa83359292d46f213fa4df2f30226184441dfd37efe2fe0d6144482a4cf7c1e51eb72c8d908054844a684e1eaaa57baf395535db0408e1b60f36e11958b1f1225574066237929511e2bdde7fe9d622ff1c96381f94ef0140f6e97f13484624b2a055f6c025c02f020fe4c47209343b5f6a1440a15fcc3c401d3f02a393ed400616eb449eda805edf3cb2580529e1c6015c363a9f13b4dc114e8f792f554c60a3140f79a776dac459eb9f081af215c2760d1b2293886217c37766ef4e13e0e78e87d61c9a55b8c28a526fabe5901108556c4cb76e4b66e2f6d56078d227b6b262ce24bf8b51be70c461ec65e2e27b09002a998eabc01a9ccbce902bafa1ba11294a67b1757ca891907073d936dcf3b8835847adf36f7d365496c168b7337ff1c26b408ce13ba32cacbf1bd5aae1d4b45c2d48d8ab29692a15f02fcbaa1a81a553af45eee00e6b9b913b882b4e44d2dbb76be913ff79ffc2e576960fb0c2241feb988ce87ad9fdea0ec23ca0936b05ddcecfe655c2608069e7df362b65ac4607273204234921cd4bd21e5db3c64680685933ef80aebb973dc55b559302f39815221bdbd50e4aabff383b509ad9051aa790054f1f1f92fe29673dc65e2e0ea6332fa51a4aedecc6aaa94ac7ee1ee88d7ede7152ada67e2151e6140353cf9dd2a3686ed0235aace9a147bd393010f2a8a27466b5c426f2ac6ca23662d4bc705bae87aff8c9b7536ecb9925daa09b86d1fe7517e6e86ee9dc247ba1795b5ca6d5695d6a389323cbb0dc2c577a293a23a7a0e81b8ffdc8ea2a1064b29607215c08a1139a2ab5b3d113ffbb65d2a733df61bc66b6d9de71eae46f61f19aa7ee9bf686853ba17ba6d3e821028a56c63fd223a9640995c3d75cd70a4c530a67ec8b2cebfc86fb74e643b405b34f2d55d50b27f5407d67df275103835a0900770b7737a3bdcd3952b74050a91f8239d47dd8159831b854fb6afe4bebf621ba64e31f29cc47e6fc1045dfc101394c0139686349069e43e6bba9ba2807c8e94d6a820b299394cab5f18726dd018d986d087cb163d3009ea96f370e89faefd73768865c534bb683e05c3a01b60657413f7dc6d233d2bca3d18b52196a3142001528b47c6d60864c33803d27ab6777ea4c5feb6eae2ad5a922a7df8aada6b28ccf4d51f0d5096f0cda1a4f875bef72501779e99c6608cbac28d575cd6ddecd4c908248edf18b06cd684e5a1a7b75e0d5cad183e15379decce994eb230a3cb7c4f20ef9bec4e514a49577ff7b8884c96728b548c1408919445ea69e4f6dcaf5e31ad87056b17aa5866b48ee92ed94bee3354ebcdd52ef0ea7e138cbb7033620b692ea96a2f70131bea1ced467e859ae32c24ecfe8fdf89b2e3cbe71c548a8e06f7767e5ae6a7038a2662fdd7605fb26259c13b1027482c6844b64ac1f63a25ce22c6ffc15c786efdc74b7bae20ec1354071106da004e45006a300ef392a1e441ea06d8b6d066277d6edbf7818c4147b0aef341141fa4cd1d8f9dafe5f78927c7a3d1bfdbd111699a6cd7c53c82bf563ebbce040f9934a7024d0000cfbf3fd25d524d4e9454beeb8c375e029e3990704a7ed2c081aeb66a2ecb5d638373ff7165a302777584ab0e417600c5f9b00369432ed2d32a15fac00a3a15e622a8ced36606e49125062532343f91177b14e292fc88a4db7d21218317e64dd32d3024f86598a23eab263d82baf23870cb4d805c0777cd1bdba4b5b0ac782792bac7234acb999afdafcd4f97e97a3220226cbfcf70ec54d730ca4abee9f828e81e0f96005269ca88ae9a6315000d602a5fdc9822596b7aa4812adf83e43d7deb506ce04e3f0a4542f976d4bca4c17e8dfb03a646a465708d0d473a4a65e929779a1208cfec87471403ad58f1787c98100dc61062ae983bacd619112b54316048bdcc31bcc9b54423d93454acd51810b02c3024b3f6452eba71c170791894fc7fa9415db071ad0a1a9767a72b3d66cf3fee39eb6e162b91c952683205a06be3f970c42b2c2647f3e1e08abceb9dbbef0e5bd19fe3e4ed958e678592dff4c196fdfe5901b76c04ad33aa95d19e699cdbff8ae48e224512a0d053e2b42a414440eab16f18fcab2867690829f6000a03e82f4b3303c9bd46ee2701a86ed3ddc3e417170f0c1df12e636a32586493159e870216e75b8433a755885ddd8b4d83139a2baa833e938b7814e4c4013deb7e012ab469e607c37a53f743d2c8f097a060b88ae28591ad3e2ad3db73b45ac460c8e6f0d7f9c46b29bdc2674b4bd9c1362eb76a1647ebde957597fd094e781ee2afad0e7999df85b3dabc2e341779650705170442de1466ae0d2dd59ad7f8fdd7e49c7e0bea990e6f74ee1e3a3c24c4aacb06b5377751a311f7eb6d9a73d1dc628831108c301a69e7f45bf38b1521bf289dccbecd9ba3ed36322c39d316712f1752c425278ec95c363ec53ee260f00059c7005f637a65f3c5479a26650ef10590521a3aaac4c85c2b8e0b817ef2ea004a1fea0ac81a0669c091e8033d36eaa3037eeb6f2bf991f8a6a5f9e08b63eb8c896371b4423bdfb12cd5e5f0be9b50463fbb8455692aef360b5893f08979c1ea5395a3d58b8d20c35d155197011260ea01d280eae79255028992f21495be7344cc99b0f5007dfa26c4f43660f1ae50d9dea6490736ae7a454a101a2927d8d25c5c508b0d7b59d80e90092db59518d41e3685931207f914c8cc1e9a3b2cc5225ed6f15c268014ba7595a688e1cb932dad3142eb147b47da004b4da4c176bb9f360dd2c0eedcbdfcd41f2c282537dfb206c7395de8fef25faa3264ecae0b538f89c403d26d76854f4af930595c96898c2d672906ee994ee87c2f5700ec8ea7149161745b9b0ed5e0fea41f7fec0c3bee77cc292e45dc580dfb4756204f98c016df649a6cd9b83db0fdfd43e9a4765cf245195552fc98d06e14d3ddb649e372c5a18a70a645b472279a6e62b19c1a8f79cbee4bc4ef189f46ee1a4b3c533f7fe64ebde5f9a7e9f3a05620fcfd347d0a5188d343abc7ec5c022dde2a8c943e8cebe3ed68c1f39a753205bd6ef4de2a55c4506d7714e4f3731d5262874cf08e95a0848eef007597999642e3affa0def87999327bdf23420547fe423681dd43da55463cbe8bcf15c67267f75e34aae0feeca81d5bad13a78bc43a0becb5a6c4ca134c90bee4da0b71358fda7504a7785f451677e5071ee580f93aebfe74e8398cb4e36f87dee3e55faf1fa740ac4ab6060737719a294d7cb193fd8f2f012faf13deb171588d7fbd18045442d7380035609ff2e3238cf94587189e73cc282cc05665d5c0c19b4b676fec4236c6e042b58d47865f3a4bb510a8cde531869f4309ef48fb3ebc8468d092ef9078ff25e698a1a12f9bd995525917bec470c2add88985886dafc54f7ee03bc1d2f03c42b3b3f9ec32baf71be2b2e89bb4d5e415f8e57fc4027f6015ca07214367a67b41e5e12ef8fb2671fd9f807fcac2fe5d5c48fcc52cc562cd8b2f2b21a7b44d869d90f729e7f230a14ffe39fd6ac708f800c6286e24b16d260b84c8450bad3a9dc80ff7520cf6b4e9ef05599cbdc251c319b774cb8433868da8701f31285395548d91a16c6688f89e38269863ffb4d3828cc3b670f967149ea817185b7fd5f052b255adaa334b2507371d6fe212a77a90a219b66e593b33214a63619a7bc8317962f29559193c48503084e055f7ae38a7d5a82c26d65e9da4f3fba26eb8b72628856006c7d7c4bed1a0e22e5071a406da031f739a0f987842a730d534279e99ae5cf43d59a9da0304f5190ce61d0e10cca0e0eadf5304dac55b772ad561429b01fdd6a0dd1b82e63baf0653fb90250c5a4075dcdf92e3da850b7b3eba842dd1ce30a319a1debafa9d8a09f5eb448497f64fe178c6e726c9bcc088a68d1dc69df846e36c85b32a89df755bbbfa1a31d6ae6dd0f8525a54e5a4f0487ef301ecfc5063f8afee64b6af66b0ea75672f6b891631d06bf7b2a246836d4eed0acbf612082d6dc2a21917c2c2b14fa2dd968bc2a5f8761fc0f6c40909e1428ea571ed1d7f381a78fb85d0203a3f30e35ad466c6a6619b7e4a3d89c3273415e390749fefe5f28caf335e48f8c7f170ad366c47e728573473e579491d4c515efb32a4b37c3fda3980128cf3bc053bedb8eed39b6bc1db1d4ba32f6a9b9e505c89f82954d5f00e566d3265b23f267a6b1ff8ba92c93a4507c6e9d95a3f6ba37f98438c08253140d9177d0f2ebc6fd76593fd7ef4ef7fa6ba28a20f8e7f4a1b6a45b6be35c0d9a902da64f9a21ee49f72714141f2aab2f02b623087328b9ea97c7cff62c1ac18944efef14d80c6e24471c749b6004a599860bedcb3c7843a95dc0b1c1c7df126a629f953eae3439682a74b57d1d4ef13ce56dce654873dce477a94ad8bd1288ab4f0c82cb7aaaef80e3adf4b67c3b03736ade5fd2f0b5ec8ab5f610cad69bb54370308e5d23527fc4dcc79e34448227ca8a8fda99a73e6a0de0acb2d0c5c9a997d04dfa7319e505469c0400eda1f441e5890a7d94dbf1407689c8733b60414cdb3707764df77bbcb2230b181a762fcaa993a7d4490035733221ddad8b0e0ba4e9b4bcf9dad972be04ed1cf09e792e22950b47327168870639fad9abb9b18a34c73e414d17c12927564275163c4ce0161b994e12d69d467795bca47d283ddf4a88891097eb26e6d3aa4fc780d256e1bed8d702e91d42706d25e822b4c7787ce7afcb2019c96ae640e448bc750a1b37340071fefe179b3a0041f2835681d6ecc35f63adb8f11dd66b3290375aedf6180965aad4223819d4f9f418d2de0386413142fe59b4ab3de720fb220c791773680ec24a2fbba8819b9954b3ad745da575050ea6a4b16c05c3698ef80e862b8ce01930f9dc5d66b3aa73197f765b2fbf89e7c39d18c2caa6efa53374cf75b9a7daa766932bbb4eda39eefe106c026219747ee36486ddc8c88ca49a3cf534620970912820f3148e7cbe47c3e4a0474bc64d2bd62d0c6001ad28dab51579b6d5706d97e69be87433b18b0e2d1ed207ab79abf0fb826c647e0a9fae1e57bc301654c1839b04e7ae2d8f2da11b93c3f05154a9f5cc7a5ee3dbf9097de37f27faa41660775352454112a16f8807989418685628c1d43e183e98397983f76906a765bc820bd61596b63c29c7b102fa503d7708c7914e4599e90a34780931009d6e3e182bdac74edc14f11381908ebbe3de30f685c27151df5e69eccaf3b3d9692a819c96b1fa6c6519f9dfe2a7e13842e7333e159b583d8c97c801933b66b7643cd75ac2fd42a1ecebb380836a5b39958a4c555d1e2", 0x1000}, {&(0x7f0000000000)="8de9159fecbc5be9056f4313ef9633f1074f7329a8536f", 0x17}, {&(0x7f0000001180)="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", 0x1000}, {&(0x7f0000000040)="3c8a16f1c634725e804cb4e2b282d8aa9f67c41100bb3eea18624b1ddfea8e", 0x1f}, {&(0x7f0000002180)="c977e99ba2e57bae8cc51bb3e15366aeaed0a9e5502486e0017afc624a37abd73be0dd7ad47f79c723764452295edc13272ff9cc9dc4a8416e5a9b2faf5fdf91e78c205826988f2829752603b2f4722c1e32c64a77ba872970b5b66133108cb8860de56b1768ab25431365aac75c161a358e314f1bcb503dc58869aeede231d42ed85c0c06dd5e2b130cd371e118a808d03820535ff31658db7dbf763faf690af43cb56668dd", 0xa6}, {&(0x7f0000000080)="975b703a6bc6a1f58490d4370879fafe859e4156cc5d9ede1c6f00d4ced0bd587d18e9", 0x23}, {&(0x7f0000002240)="d5ff26cdd0223a6515e46c33409b8c37e4ece674463891698df7e3ba4dc836df970378546e2d3f5a3f8a95810e4fe02a8d719d0267719922c266fd012030126945025a448c0645ce90fc8d8dd582e217716e4a7839", 0x55}, {&(0x7f0000000100)="78befd", 0x3}, {&(0x7f00000022c0)="06610433668b3aba6821e7891e1dfb71318ca17cc8b23c65927fa07d1e0ee708f165a734e1fadedfa97e2c2721651387dec44547", 0x34}, {&(0x7f0000002300)='Cl', 0x2}], 0xa, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0xfffffe29) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 821.171167] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:09 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@gcm_128={{0x304}, "7f6c1259208a3daa", "3b26b8fb891ed8d7dd5913c5f40447b2", "7783737c", "0a935cf9ab19ee9e"}, 0x28) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$eventfd(r5, &(0x7f0000000000)=0x8, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 821.380561] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x7f, 0x2) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$P9_RCLUNK(r4, &(0x7f0000000000)={0x7, 0x79, 0x2}, 0x7) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r5 = fcntl$getown(0xffffffffffffffff, 0x9) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x1c) tkill(r6, 0x3c) ptrace$cont(0x18, r6, 0x0, 0x0) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r6, 0x0, 0x0) r7 = getpgrp(r6) tgkill(r5, r7, 0x2) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:30:09 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, 0x0, 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 821.637994] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 821.793413] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 821.819065] audit_printk_skb: 60 callbacks suppressed [ 821.843464] audit: type=1400 audit(1573846209.745:2371): avc: denied { read } for pid=458 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 821.935470] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(0xffffffffffffffff, 0x4c01) 19:30:10 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x80280, 0x0) bind$inet(r0, 0x0, 0xfffffffffffffe52) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x11d) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 822.312769] audit: type=1400 audit(1573846210.245:2372): avc: denied { create } for pid=479 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 822.417767] audit: type=1400 audit(1573846210.345:2373): avc: denied { create } for pid=458 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 822.418158] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 822.484018] audit: type=1400 audit(1573846210.415:2374): avc: denied { write } for pid=479 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:10 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$ASHMEM_SET_NAME(r5, 0x41007701, &(0x7f0000000380)='/dev/keychord\x00') socketpair$unix(0x1, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000000)="26d0f2ce56c0ad980c645b130473a5326034ff01294bea80376a3a3399e0e2b2f57d46fe3637a2b99373c8", 0x2b}, {&(0x7f0000000040)="d22f0238aad2504ecc4bc822c97fa39403c595995a8ebb9d025bb96cd28cd79baa7224592ca4c66848afcee22e4f2ed15c00be5911179f8e886e0a96221646a37f5bf19788422c3a8f29c904b0a1f54130bea278e40617eb50d114a40da5f4fa6f1267ebc025441419b07b84cb4d95e57e3b3edb67cae17463b7681b61facc", 0x7f}, {&(0x7f0000000180)="71b1c6c006f6513182cc748eb4a6c71051f589bf618896e03aa901b39f359a283f2f203252142b5463a2ce8489c6178a94e03225089608f40b997879d54d86031f045387f8b11037acf06ee045bed6bd619926472b840162b2bf7daed6221b6a02a95cdbb5613526c5a08f0c15ea6e8acf423e96df31f3a03a78a2f2ad409acaf3724b624cb122d076a9239eb9cb7d5b5d1112ccd94fe1acc8f6a30fa24edb1f7783dba192928edeff675c6e4ef8391f9b4a30078a2418c722571da664949bfde8d8d7fc6c5a8ff23256511873425ff802bc51deb03f289f5449fb8e7fb7954afa5c4cab5e42b886e6f9d556c9db460a62eb3ccdd541a0659b470c", 0xfb}, {&(0x7f0000000280)="7c124aa2de5e4b3e5b874458e67adaeb5ca31a8b4b37f88ceb005bf7436aee1e7ec2da2063dc953d8c53306244fcdb81547d0f758767ba04bdc245c1e0e7e51b1390aa306ef8f566bbe986ee2393b728af7609f65913e36157a2df329839a96b2708fa5f5965cef10411d9b82c29f034bc7e1c9bf0dc47c7bb56b0034b198d29259442cbcb5c6eb70f4db4ff6da63960da23eb6af5bedf85ab67da09051d4ad2ba1c78c5a0a62d901698be554edda68f7a02f06a5132613f2b9b435a7b60e1f32a9a549a4b5a5374a44f325d8ab78647", 0xd0}], 0x4, 0x4) ioctl$TCSETS(r5, 0x5402, &(0x7f00000003c0)={0x1, 0x5, 0x2, 0x5, 0x14, 0x20, 0x7, 0x0, 0xffffffff, 0x8, 0xffff, 0x28}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r6, 0x80) r7 = accept4(r6, 0x0, 0x0, 0x0) r8 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x400000, 0x0) r10 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x17, 0x4, @tid=r10}, &(0x7f0000000080)) r11 = syz_open_procfs(r10, &(0x7f0000000380)='mounts\x00') pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r12, &(0x7f00000001c0), 0xfffffef3) pipe(&(0x7f0000000400)={0xffffffffffffffff}) r14 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r15 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x2000, 0x0) pipe2(&(0x7f0000000500)={0xffffffffffffffff}, 0x4000) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) read(r17, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r18, 0x0, 0x0) r19 = syz_open_dev$loop(&(0x7f0000000780)='/dev/loop#\x00', 0x2, 0x50d00) r20 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000001940)='/selinux/avc/hash_stats\x00', 0x0, 0x0) io_submit(0x0, 0x7, &(0x7f00000019c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x9, 0xb54d, 0xffffffffffffffff, &(0x7f0000000300)="9896e45784347078968a8ddce6847aec34ea5993f7d35d5c4b21c21d1e724214d1afe3e7128a2841650e41ab9a7adfd85c6eefbc7cdd41c248deea8c42b695d2021304c46f1ad7d26208b032ceb2ba676a423db18358796cd7afbd5a9e93e4a3300ce24dccd42f95d191", 0x6a, 0x6, 0x0, 0x683cb2b4bc11b951, r14}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x799b4996c8156bd3, 0x100, r15, &(0x7f0000000440)="f0f70715ffccd4a0da879e076015989ddebf79275da665750b5c7d4429f10f5111258687906359a909118c778c15849e063f5b8d1ecb3ea035bc3c45742f1f92196284a3db6e3d4c6d773656a562749d8f958f5f7193acee5812ce4b829d066a2d844ec1f27bcce9d8aea2f33b817f3df29d38c76826c266a4e958c3ae6223d9a6a0385a2d75fe848036eb79", 0x8c, 0x2, 0x0, 0x0, r16}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x3, 0x2000000000, r14, 0x0, 0x0, 0x2, 0x0, 0x0, r17}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x1, 0x6, r17, 0x0, 0x0, 0xdf9b, 0x0, 0x0, r18}, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x65, r19, &(0x7f00000007c0)="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", 0x7dc, 0x0, 0x0, 0x1}, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000001980)={0x0, 0x0, 0x0, 0xd57ea18703433360, 0x2, r17, &(0x7f0000001880)="b6db78d7f4ba81314af85f29b659359d8d5f31366fda534a66bc58fd444ba1fabca895cb7b4662fb7e5d4700f34192ad02acd240b6ef501f4c32c1efd7bd861957332991cf8f15060f692ad534683c3ebb4f9b965e9c7e0b47a144dd300b8860cb21fa2cf15a1392fc28ef4febed55c8d6afb40926af543af19bbbf85907585679ffba52d65c0f80f7d4cdb98d93fef78c0765cdadcfd28f33580266b3da59bfb761cb476ecf1c449d65d8", 0xab, 0x9, 0x0, 0x0, r20}]) r21 = accept4$unix(r20, &(0x7f0000000040), &(0x7f0000000140)=0x6e, 0x100000) r22 = eventfd(0x4) poll(&(0x7f0000000180)=[{r21}, {0xffffffffffffffff, 0x2}, {r13}, {r22}], 0x4, 0x10000) read(r13, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendmsg$NBD_CMD_RECONFIGURE(r7, &(0x7f00000004c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000480)={&(0x7f00000003c0)={0x88, r8, 0x20, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x2c, 0x7, [{0x8, 0x1, r9}, {0x8, 0x1, r7}, {0x8, 0x1, r11}, {0x8, 0x1, r12}, {0x8, 0x1, r13}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3f}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xffffffffffffff80}]}, 0x88}, 0x1, 0x0, 0x0, 0x4010}, 0x8048000) sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f00000004c0)={&(0x7f0000000400), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x34, r8, 0x2, 0x70bd27, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2fa}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x34}, 0x1, 0x0, 0x0, 0x4}, 0x20080) 19:30:10 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x80000000) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 822.705522] audit: type=1400 audit(1573846210.635:2375): avc: denied { dyntransition } for pid=487 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 19:30:10 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffb}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x6, 0x0, 0x0) r1 = openat$apparmor_task_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) fcntl$addseals(r1, 0x409, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000040)='./bus\x00', 0x0) fallocate(r2, 0x10, 0x8003, 0x8020001) write$P9_RREADLINK(r2, &(0x7f00000003c0)=ANY=[@ANYBLOB="100082001701"], 0x6) syz_genetlink_get_family_id$tipc(0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001bc0)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmmsg$unix(r3, &(0x7f0000002040)=[{0x0, 0x0, 0x0}, {0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000001ec0)}], 0x1, 0x0, 0x0, 0x8010}], 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r3, 0x2405, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x9a004000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x0, 0x0, 0x70bd28, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x2004) 19:30:10 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, 0x0, 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 822.840768] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 822.864272] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r4, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r4, &(0x7f00009322c4)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) dup2(r2, r4) tkill(r3, 0x1000000000015) [ 822.996891] audit: type=1400 audit(1573846210.925:2376): avc: denied { create } for pid=490 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 823.000598] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 823.104534] audit: type=1400 audit(1573846211.025:2377): avc: denied { create } for pid=503 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 823.180764] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 823.248851] audit: type=1400 audit(1573846211.175:2378): avc: denied { write } for pid=503 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 823.320521] keychord: Insufficient bytes present for keycount 37 [ 823.321366] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 823.434578] audit: type=1400 audit(1573846211.365:2379): avc: denied { create } for pid=510 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:11 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x80c, 0xffffffffffffffff) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:11 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="820300000a00000000000000090000000000000000000000020000007f0000010000000000000000020001000065e4000000000000000000030000000000000002000000e00000010000000000000000"], 0x50}}, 0x0) r3 = dup2(r0, r2) ioctl$TIOCSISO7816(r3, 0xc0285443, &(0x7f0000000100)={0x401, 0x1, 0x3, 0xfffff800, 0x5}) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open(&(0x7f0000000000)='./file0\x00', 0x8601, 0xed) setsockopt$inet_group_source_req(r5, 0x0, 0x2f, &(0x7f0000000180)={0x7, {{0x2, 0x4e21, @remote}}, {{0x2, 0x4e22, @multicast2}}}, 0x108) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 823.466628] audit: type=1400 audit(1573846211.395:2380): avc: denied { create } for pid=512 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 823.551256] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 823.559238] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 19:30:11 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:11 executing program 0: setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, 0x0, 0x0) getrandom(&(0x7f0000000100)=""/44, 0xfffffffffffffed2, 0x0) pipe(0x0) r0 = memfd_create(&(0x7f0000000040)='u', 0x0) r1 = dup(r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f0000000000)='\x00', &(0x7f00000001c0), 0x0, 0x1000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x0) 19:30:12 executing program 4: open(0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r1 = epoll_create(0x3) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) r2 = epoll_create(0x2) splice(r2, 0x0, r0, 0x0, 0x1, 0x4) syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) socket$unix(0x1, 0x5, 0x0) ioctl$PPPIOCSNPMODE(r3, 0x4008744b, &(0x7f0000000000)={0xc0e3, 0x1}) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x319) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x200400201) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x9, 0x5, 0x5, 0x101, 0x9d0aa8c95944b381, 0x8, 0xb11, 0x90, 0x40, 0x159, 0x3, 0xff, 0x38, 0x1, 0x0, 0x9, 0x7}, [{0x4, 0x9, 0xfff, 0x1, 0x1, 0x1ff, 0x7, 0x2}, {0x2, 0x4, 0x100, 0x3fb, 0x1, 0x0, 0x5, 0x7fffffff}], "5a4a3f1277139e5272a90798c7ccad705b06abce96c15abafa3b019e904f30b46714c42fd5a38b77e1c97f646793e7d39ed2122661a4a0ef27de74a064dc00ab719c27f413a915d527a5caad20c70c9286d4dff093917a1bda92762f268619aa3f9ab3", [[], [], [], [], [], [], [], []]}, 0x913) ioctl$RTC_WKALM_RD(r7, 0x80287010, &(0x7f0000000040)) [ 824.091786] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 824.280569] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 824.288483] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:12 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x2, 0xa, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) [ 824.480802] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 824.682416] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:12 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"/413], 0x50}}, 0x0) ioctl$EXT4_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)=0x20180020) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r3, 0x0, r4) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r3, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e24, 0x341a, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9}, {0xa, 0x4e23, 0x34, @loopback, 0x3}, 0xe9a, [0x6, 0x6, 0x2, 0x7, 0xff, 0x9, 0x6, 0x10001]}, 0x5c) dup2(r2, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:12 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) ioctl$UI_DEV_SETUP(r1, 0x405c5503, &(0x7f0000000180)={{0x0, 0x1, 0x5, 0x856}, 'syz1\x00', 0x54}) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000000)={0x7, 0x4, 0xd2, 0x4, 0x0, 0xd6, 0x6, 0xff, 0x20, 0xc0}) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(r1, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) syncfs(r2) [ 824.900929] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 824.911345] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 825.010571] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:13 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000440)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000feb59f698000000700000000000000000000ff00000000000000209bebc192542715b75a73b3175e9d142a32058d2a7661747292484624dee568967719ca7796028409e0ad4a907e9443b04329f54656996048c392bb9b2caf2c43e303fe389a"], 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 19:30:13 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 825.492167] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 825.499561] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 825.631132] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:13 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = gettid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYRES16], 0xfffffdb6) ioctl$int_in(r1, 0x5452, &(0x7f0000b28000)=0x6) fcntl$setsig(r1, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r2}], 0x1, 0xffffffffffbffff8) dup2(r1, r2) fcntl$setown(r1, 0x8, r0) tkill(r0, 0x16) 19:30:13 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x9, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x106, 0x2, 0xb7, "9833d0a57e8329cb7b68757fe9f1f2b3", "79a80300a53471fae41065f083986347602d4c59d658aeb75a37408d9e1fed63c4d5f7b176850d9e55bc2d13ab3dbd3b1d5c382e182e2c50b29fff864ff5e4343677c1f6d5447279190171134676d246fc8de60de93f003c7d079bf63381011c4052dab9c63d447170a3819d8049112f8f32382cc750017952ece0dfacc65432b37940d4c2ac434e10f89f3345ac1b891595a79092624c29e8192fa453e8f3520b8e61835999d7ffc0c8a4020bf72805081d0eecd7b8cf654ddbf0a7162dfda0ffb3fe6d6250154a90974261bb292a5e97f02391d4e90bfa3e2bf6f39735d857d9e9d883cd02eaae07b012eafc74e9431a"}, 0x106, 0x6) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) open(&(0x7f0000000040)='./file0\x00', 0x400000, 0xc3) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 825.770701] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:14 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000440)=ANY=[@ANYBLOB="020d0000140000000000000000000000080012000000030000000000000000000600000000000000000000000000000000000000000000000000000000000000ff02000000000000000000000000000105000500000000000a0000000000000000000000000000000000ffffac141400000000000000000005000600000000000a00000000000000feb59f698000000700000000000000000000ff00000000000000209bebc192542715b75a73b3175e9d142a32058d2a7661747292484624dee568967719ca7796028409e0ad4a907e9443b04329f54656996048c392bb9b2caf2c43e303fe389a"], 0xa0}}, 0x0) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000100), 0x4) sendmsg$key(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x2, 0x12, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 826.121285] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 826.128939] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 826.272044] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:14 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bind$netlink(r4, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbfd, 0x1000000}, 0xc) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @mss={0x2, 0x9}, @sack_perm, @timestamp], 0x4) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 826.371053] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:14 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 826.501725] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:14 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = accept(r0, &(0x7f0000000200)=@ax25={{0x3, @netrom}, [@bcast, @remote, @rose, @netrom, @rose, @null, @rose, @null]}, &(0x7f0000000000)=0x80) fsetxattr$security_capability(r2, &(0x7f0000000180)='security.capability\x00', &(0x7f00000001c0)=@v2={0x2000000, [{0x6, 0x6}, {0x9}]}, 0x14, 0x0) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r3 = socket(0x8, 0x4, 0x3f) write$binfmt_script(r3, &(0x7f0000000300)={'#! ', './file0', [{0x20, '/dev/keychord\x00'}, {0x20, 'security.capability\x00'}, {0x20, '/dev/keychord\x00'}, {0x20, '\xb1cgroupsecurity,\xb7'}, {0x20, 'wlan1:'}, {0x20, 'vboxnet1em1securitylo,)security'}, {0x20, 'security.capability\x00'}, {}], 0xa, "069e1e7ee2fb4cb2d0c603"}, 0x98) 19:30:14 executing program 3: [ 826.997569] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:14 executing program 4: open(0x0, 0x8002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setlease(r0, 0x400, 0x1) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000180)=@v2={0x5, 0x1, 0x1, 0x9, 0xd2, "5a30557dba663ec23f2935873aadfac1b4d0602e8017b7e993a555dfae32e1845d36d32d6105afde555f3821d49a5f5c8f045fe427b9c2a1d144dbe415be0b46a6f74e9d2dcede36dbe8c6a9c8827c95029fd5da32a6ba1de412b15fbbb955cfab9ba17b8eb93532d35ebd104ca13a13244325c523471e317ce830615d77c865085f78fc0a32bdcb20e88fb27d984493afa2bf32da76f86eee4e7ed40b5e8224620f43c8ccad9d95672e1f177b5d3a9281cc39d738220bbc930b1e969f6e25a34628287134ad7190e5e029aa7a629a432f84"}, 0xdc, 0x1) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:ld_so_t:s0\x00', 0x1d, 0x1) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@random={'trusted.', '^{,%\x00'}, &(0x7f00000002c0)=""/112, 0x70) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 827.241195] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 827.249947] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 827.290636] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:15 executing program 3: 19:30:15 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8001, 0x0) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup2(r0, r1) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 827.483052] audit_printk_skb: 84 callbacks suppressed [ 827.518613] audit: type=1400 audit(1573846215.415:2409): avc: denied { create } for pid=637 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 827.561013] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 827.660911] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 827.696941] audit: type=1400 audit(1573846215.625:2410): avc: denied { relabelto } for pid=637 comm="syz-executor.4" name="KEY" dev="sockfs" ino=122051 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ld_so_t:s0 tclass=key_socket permissive=1 [ 827.705751] audit: type=1400 audit(1573846215.625:2411): avc: denied { write } for pid=637 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:15 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:15 executing program 3: [ 827.823884] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 828.121690] audit: type=1400 audit(1573846216.055:2412): avc: denied { read } for pid=637 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 828.171360] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 828.187180] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 828.309510] audit: type=1400 audit(1573846216.235:2413): avc: denied { create } for pid=652 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 828.445688] audit: type=1400 audit(1573846216.375:2414): avc: denied { write } for pid=652 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 828.617385] audit: type=1400 audit(1573846216.545:2415): avc: denied { create } for pid=637 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 828.647740] audit: type=1400 audit(1573846216.575:2416): avc: denied { relabelto } for pid=637 comm="syz-executor.4" name="KEY" dev="sockfs" ino=122094 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ld_so_t:s0 tclass=key_socket permissive=1 [ 828.752742] audit: type=1400 audit(1573846216.685:2417): avc: denied { write } for pid=637 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:17 executing program 0: 19:30:17 executing program 3: 19:30:17 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PIO_CMAP(r4, 0x4b71, &(0x7f0000000000)={0xa01, 0x7, 0x4, 0x80000001, 0x5, 0x1f}) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:17 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='\xf5dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r1) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x4, 0xd7) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r4 = dup(r3) ioctl$FS_IOC_FIEMAP(r4, 0xc020660b, &(0x7f0000000000)={0x7fffffff, 0x1ff, 0x6, 0x9, 0x2, [{0x59, 0x20, 0xffffffff, 0x0, 0x0, 0x1000}, {0x4, 0x47, 0x8000000000000}]}) listen(r2, 0x5) 19:30:17 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:17 executing program 4: open(0x0, 0x0, 0x1) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:17 executing program 3: [ 829.246927] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 829.258401] audit: type=1400 audit(1573846217.185:2418): avc: denied { create } for pid=673 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 829.301047] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 829.441297] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 829.448714] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:17 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, 0x0, 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:17 executing program 0: 19:30:17 executing program 3: 19:30:17 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000300)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/der/keychkrd\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x200000fffffffe, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000000)=0x20000100000001, 0xfffffffffffffd7e) lseek(r1, 0x8, 0x1) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$TIPC_NL_PEER_REMOVE(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="000425bd7000fbdbdc25140000005c0005000800010069620000040002003c00020008000300000000000800020001000000080001001800000008000300a8000000080003007f0000000800040006000000080002000900000008000100657468000800010069620000305f0d0008000100f8ffffff040002000800010001000800010002000000080001003f000000080002001c0005000800010075647000080001006962000008000100696200"/190], 0xc4}, 0x1, 0x0, 0x0, 0x8000}, 0x4000800) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0xa0080, 0x0) r6 = gettid() syz_open_procfs(r6, &(0x7f0000000180)='coredump_filter\x00') timer_create(0x4, &(0x7f0000000340)={0x0, 0x0, 0x0, @tid=r6}, &(0x7f0000000380)=0x0) timer_gettime(r7, &(0x7f00000003c0)) timer_gettime(r7, &(0x7f0000000340)) ioctl$EXT4_IOC_GROUP_ADD(r5, 0x40286608, &(0x7f0000000280)={0x1, 0x100000000, 0x1, 0x0, 0x1ff, 0x8}) [ 829.832718] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:18 executing program 0: 19:30:18 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSNPMODE(r2, 0x4008744b, &(0x7f0000000080)={0x80fd, 0x1}) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev?\x06exchord\x10', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r5, 0x0, r6) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r5, 0x6, 0x14, &(0x7f0000000000)=0xcfcac09430db5b6c, 0x4) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:18 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:18 executing program 3: [ 830.717413] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:18 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1030c0, 0x8) ioctl$UI_SET_KEYBIT(r2, 0x40045565, 0x6) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:18 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x4, &(0x7f0000000180)=""/88, &(0x7f0000000040)=0x58) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:18 executing program 3: 19:30:18 executing program 0: 19:30:19 executing program 4: open(0x0, 0x0, 0x8) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$BLKRRPART(r2, 0x125f, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 831.281181] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:19 executing program 3: creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f0000000200)='devpts\x00') r0 = gettid() tkill(r0, 0x3c) r1 = getpid() connect$inet6(0xffffffffffffffff, 0x0, 0x0) sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)='./file1\x00', 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000059, 0x0, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)) socket$packet(0x11, 0x2, 0x300) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) r3 = getgid() fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="b7e104430d75dff71d49ba78037bc775867ee0c2b82960abd15fd9568965ddad06aa9e5c4ab65fe12acd322facba168c8156a6056f36400a6853a16c9838d083546c7d3d5f8f2debbb34cd15770b203b09792cd12d266a635810bf0876ad8a39e365923c9743a7e48e2d645c9b8b852d351aa03c3d3f0453109b157e706c97c5320eb278a601ef45142c8e7c29c2733c2e4b484735bd559bebf348f4d68b872674e58834a9df0e92d14ad1281e771855137300000000000000000000000000000000000000000000000000001ea4817e4c2bbd039f702a683fb22488261abb415c3a64bd3a4faf9341297f1b44b674001aa58d8a05a7b34daaf56afb476864a10c2cae50a73c23051d1f10f8242f7bd02eb9", @ANYBLOB, @ANYRES32=r3, @ANYBLOB="110100000000000091c46cf6960b8c2747655a6800000000000000007bfdc10e344a4c86914bece2dced4ebc5c83001d02d4f340034afaecef242f6ac292625d956492ef020000008d7884aa1e81a0f3c50636dd23f5c2e9b02d4e2c020000005a14db5083c1aed6b165c02f47a3f48e535a7d30fc40b8aba14152de704b20b493b090bd58a7ecdf71823451ad79120004000000000000d207ecae26efcd5c918c3fa4c6571b7fc8dfda9488eb3dc6df7d78dfcd000000000000000000"], 0x6, 0x1) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) write(r5, &(0x7f0000000340), 0x41395527) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x0, 0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0x100}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, 0x0) 19:30:19 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:19 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) renameat2(r0, &(0x7f00000000c0)='./file1\x00', r0, &(0x7f0000000100)='./file0\x00', 0x4) [ 831.551703] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 831.752075] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 831.759475] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:19 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) [ 831.871151] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 831.878564] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:19 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 832.010370] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:20 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x101000, 0x0) write$P9_ROPEN(r1, &(0x7f0000000200)={0x18, 0x71, 0x2, {{0x4, 0x3, 0x8}, 0x6640}}, 0x18) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) sendto(r0, &(0x7f0000000000)="6150eabf8ae2ed977e340f3bc93e4842071e5b67adb1fd3240522942055f08fe44e36c36182b7ba47cc0919398618f9546ac58d0a79b93050fb7fb2a85e73a0adcfbb38ba3eb2e077fe568b957b7547c55d4307cc7e592c8f5ec9d1858ee", 0x5e, 0xa88c58e394444dfa, &(0x7f0000000180)=@pppol2tp={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x27}}, 0x1, 0x2, 0x1, 0x1}}, 0x80) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) sendfile(r3, r2, &(0x7f0000000240)=0xba4, 0x5) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r3, r2) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) fdatasync(0xffffffffffffffff) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000080)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:20 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$BLKRAGET(r2, 0x1263, &(0x7f0000000040)) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:20 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:20 executing program 3: syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(0x0, 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) 19:30:20 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_all\x00', 0x0, 0x0) write$eventfd(r2, &(0x7f0000000040)=0x20000100000003, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:20 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 832.741925] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 832.789616] audit_printk_skb: 57 callbacks suppressed [ 832.812332] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 832.817444] audit: type=1400 audit(1573846220.715:2438): avc: denied { create } for pid=775 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:20 executing program 3: open(0x0, 0x8002, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = socket$key(0xf, 0x3, 0x2) fcntl$setlease(r0, 0x400, 0x1) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000180)=@v2={0x5, 0x1, 0x1, 0x9, 0xd2, "5a30557dba663ec23f2935873aadfac1b4d0602e8017b7e993a555dfae32e1845d36d32d6105afde555f3821d49a5f5c8f045fe427b9c2a1d144dbe415be0b46a6f74e9d2dcede36dbe8c6a9c8827c95029fd5da32a6ba1de412b15fbbb955cfab9ba17b8eb93532d35ebd104ca13a13244325c523471e317ce830615d77c865085f78fc0a32bdcb20e88fb27d984493afa2bf32da76f86eee4e7ed40b5e8224620f43c8ccad9d95672e1f177b5d3a9281cc39d738220bbc930b1e969f6e25a34628287134ad7190e5e029aa7a629a432f84"}, 0xdc, 0x1) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fsetxattr$security_selinux(r3, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:ld_so_t:s0\x00', 0x1d, 0x1) fgetxattr(0xffffffffffffffff, &(0x7f0000000280)=@random={'trusted.', '^{,%\x00'}, &(0x7f00000002c0)=""/112, 0x70) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 832.825972] audit: type=1400 audit(1573846220.745:2439): avc: denied { write } for pid=775 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 832.851816] audit: type=1400 audit(1573846220.775:2440): avc: denied { dyntransition } for pid=777 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 832.953595] audit: type=1400 audit(1573846220.875:2441): avc: denied { create } for pid=788 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:21 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 833.235223] audit: type=1400 audit(1573846221.165:2442): avc: denied { write } for pid=788 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:21 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:21 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='\x00\x00\xba\'\x00\x00\x00\x00d\x00\xcaT\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8801, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) getsockopt$inet6_int(r0, 0x29, 0xa, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 833.478040] audit: type=1400 audit(1573846221.405:2443): avc: denied { create } for pid=799 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 833.511732] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 833.630161] audit: type=1400 audit(1573846221.555:2444): avc: denied { write } for pid=799 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 833.653909] audit: type=1400 audit(1573846221.555:2445): avc: denied { relabelto } for pid=799 comm="syz-executor.3" name="KEY" dev="sockfs" ino=122915 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:ld_so_t:s0 tclass=key_socket permissive=1 [ 833.702849] audit: type=1400 audit(1573846221.635:2446): avc: denied { read } for pid=788 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 833.727334] audit: type=1400 audit(1573846221.655:2447): avc: denied { create } for pid=806 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 833.760527] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 833.776415] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 833.841057] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:21 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:21 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="00fb70a2044330a7fc98f17fa7969626fb8d93e1cce2926eec1da72043b4f2cba3bb9fe1ba35eae5b87ba1e593238fa1910f064d27fe130efc378cba234fd771e59732a64afa90f0bc4ae3efbb8a4926a7aad880dc8f71412a8fe5217d87ed9ecc74fed73bc960af45fbb87788975236"], 0x70, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:21 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:22 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140), 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x2200) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 834.075381] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:22 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TUNGETVNETHDRSZ(r2, 0x800454d7, &(0x7f0000000000)) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:22 executing program 3: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x9, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x106, 0x2, 0xb7, "9833d0a57e8329cb7b68757fe9f1f2b3", "79a80300a53471fae41065f083986347602d4c59d658aeb75a37408d9e1fed63c4d5f7b176850d9e55bc2d13ab3dbd3b1d5c382e182e2c50b29fff864ff5e4343677c1f6d5447279190171134676d246fc8de60de93f003c7d079bf63381011c4052dab9c63d447170a3819d8049112f8f32382cc750017952ece0dfacc65432b37940d4c2ac434e10f89f3345ac1b891595a79092624c29e8192fa453e8f3520b8e61835999d7ffc0c8a4020bf72805081d0eecd7b8cf654ddbf0a7162dfda0ffb3fe6d6250154a90974261bb292a5e97f02391d4e90bfa3e2bf6f39735d857d9e9d883cd02eaae07b012eafc74e9431a"}, 0x106, 0x6) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) open(&(0x7f0000000040)='./file0\x00', 0x400000, 0xc3) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 834.527279] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:22 executing program 0: clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:22 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 834.902884] keychord: invalid keycode count 0 [ 834.903062] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 835.070579] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:23 executing program 0: clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 835.114911] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 835.164137] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:23 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 835.411150] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:23 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) mmap$binder(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x11, r4, 0xabc9) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 835.510499] keychord: invalid keycode count 0 [ 835.517284] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 835.567388] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:23 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) write(r1, &(0x7f0000000000)="a77f5488e8a54480f2b30401ed212f315cc45e0f00db7ea31ae0601bee6eddf1b1087b21eadfd88a92f76c910e44c5413671fac3e575d92a6cfee38b362b377bd8e8c7028cf69c2c205d49e206937a6654d62df2d12b3739097ed986f1b0899795fec99382f3b398e515eed23010aa3c7575ac96909ff7ff247b05ea74a37da8e193e832f61a02bf17dc1f9ed09be0c761559a0d0f1153", 0x97) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000100)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:23 executing program 0: clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 835.760667] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:23 executing program 3: clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:24 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, 0x0, 0x0) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 836.081382] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 836.088777] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 836.207686] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=42472 sclass=netlink_xfrm_socket 19:30:24 executing program 0: ioprio_set$pid(0x0, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 836.252003] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:24 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000200)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0xa}}) bind$unix(r2, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e22}, 0xfffffffffffffe74) socketpair$unix(0x1, 0x0, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0x2d, 0x1, 0x4, "65e95df90cbcc332ba54df2876cace71", "e93652f0d9a0465484b4034b3fb9740dc7e7fd7c280972de"}, 0x2d, 0x2) [ 836.420913] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 836.449619] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:24 executing program 3: clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 836.587290] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=42472 sclass=netlink_xfrm_socket 19:30:24 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) r4 = accept$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000040)=0x1c) read(r4, &(0x7f0000000080)=""/27, 0x1b) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:24 executing program 0: ioprio_set$pid(0x0, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 836.792515] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 837.021215] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 837.030385] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 837.039913] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:25 executing program 3: clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 837.220518] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:25 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, 0x0, 0x0) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 837.420788] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:25 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r4, 0x29, 0xd3, &(0x7f0000000180)={{0xa, 0x4e24, 0x0, @loopback, 0x1}, {0xa, 0x4e24, 0x7, @dev={0xfe, 0x80, [], 0x25}, 0x1}, 0x5, [0x7, 0x2, 0x4, 0x8, 0x9, 0x1ff, 0x2, 0x6]}, 0x5c) dup2(r1, r0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000040)=[@timestamp, @mss={0x2, 0x718}, @timestamp], 0x3) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@empty, 0x7fff, 0x3, 0x3, 0xd33b90a7deea1eb6, 0x79d, 0x6}, 0x20) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:25 executing program 0: ioprio_set$pid(0x0, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 837.642340] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:25 executing program 4: r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)="d6d6bf30811b4fe329ed40f01b7d963af8") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300002a00000000000000000000000200060000000000020000007b00ff0f000000000000000002000100000000000000000000000000030300400000000002000000e000000100000000000000005381dabfde59c464df90e67bc0f7d0796f4b2ab7595962e93bcdfa2e47f9f0b01c96aedc36862b2fee4985bcb64bc7297624e8f0b99228ec37b2b567664594f326db23c1"], 0x50}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000100)) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:25 executing program 3: ioprio_set$pid(0x0, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 837.780548] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 837.852298] audit_printk_skb: 87 callbacks suppressed [ 837.857543] audit: type=1400 audit(1573846225.785:2477): avc: denied { write } for pid=923 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:25 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 838.082284] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 838.194981] audit: type=1400 audit(1573846226.115:2478): avc: denied { create } for pid=939 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 838.349670] audit: type=1400 audit(1573846226.275:2479): avc: denied { write } for pid=939 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 838.382108] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 838.391405] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:26 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x100000005) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$sock_inet_tcp_SIOCATMARK(r12, 0x8905, &(0x7f0000000080)) r13 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_ROPEN(r13, &(0x7f0000000180)={0x18, 0x71, 0x2, {{0x84, 0x3}}}, 0x18) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) ioctl$TCSETS2(r16, 0x402c542b, &(0x7f0000000000)={0x6, 0x4e, 0x2c1, 0xfffffff7, 0x8, "26c737df000000000000ff00", 0x9, 0xe143}) socket$unix(0x1, 0x1, 0x0) r17 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r17, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r18 = openat$selinux_member(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/member\x00', 0x2, 0x0) dup2(r18, r10) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 838.403931] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:26 executing program 3: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, 0x0, 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 838.482133] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:26 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 838.570576] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:26 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, 0x0, 0x0) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 838.751797] audit: type=1400 audit(1573846226.685:2480): avc: denied { read } for pid=939 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:27 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x1f, 0xc283dd97bd2c0978, 0x6, "c8ecbc9763c8671e1be5d56ad7b5edd2", "ead87c98d745e152c7f8"}, 0x1f, 0x1) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) fchdir(r2) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 839.061840] audit: type=1400 audit(1573846226.995:2481): avc: denied { create } for pid=960 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:27 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x73, 0x1, {{0x82, 0x1, 0x2}, 0x8}}, 0x18) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x70bd29, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='io.bfq.weight\x00', 0x2, 0x0) read(r0, &(0x7f0000001180)=""/4088, 0xff8) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) fchmod(r1, 0x42) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 839.127265] audit: type=1400 audit(1573846227.055:2482): avc: denied { create } for pid=939 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:27 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 839.195292] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 839.260365] audit: type=1400 audit(1573846227.185:2483): avc: denied { create } for pid=965 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:27 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x204002, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7, 0x4) syz_genetlink_get_family_id$net_dm(0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r3, r2) write$eventfd(r2, &(0x7f0000000140)=0xa5, 0x8) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x50}}, 0x0) sendfile(r4, r5, &(0x7f0000000080)=0x7, 0x5) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 839.293179] audit: type=1400 audit(1573846227.225:2484): avc: denied { write } for pid=960 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 839.400916] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 839.481656] audit: type=1400 audit(1573846227.415:2485): avc: denied { write } for pid=965 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 839.570572] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:27 executing program 3: r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000040)="d6d6bf30811b4fe329ed40f01b7d963af8") r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300002a00000000000000000000000200060000000000020000007b00ff0f000000000000000002000100000000000000000000000000030300400000000002000000e000000100000000000000005381dabfde59c464df90e67bc0f7d0796f4b2ab7595962e93bcdfa2e47f9f0b01c96aedc36862b2fee4985bcb64bc7297624e8f0b99228ec37b2b567664594f326db23c1"], 0x50}}, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r2) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000100)) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 839.781747] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 839.894747] audit: type=1400 audit(1573846227.825:2486): avc: denied { create } for pid=986 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:27 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140), 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 839.961654] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:27 executing program 0: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, 0x0, 0x0) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 840.101001] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 840.232503] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 840.255384] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:28 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc810020}, 0xc, &(0x7f00000000c0)={&(0x7f0000000500)=ANY=[@ANYBLOB='V\x00\x00o\x00', @ANYRES16=r5, @ANYBLOB="f31c2cbd7000fbdbdf250d000000380002000800080080000000080005009906000014000100317a23f10a22fa36eba8393d8b528bdf46f91448d92e8688da770cb00124336608000d0000000000080002004e23000024000200080007000300000008000e004e24000008000d000000e0ff07000d00020000000800760000f8fffffea7b633d4b56fbad808530c947923"], 0x78}, 0x1, 0x0, 0x0, 0x4002014}, 0x1000) sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x220008}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0xa4, r5, 0x1, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x800}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x194de064}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="1436e6da279dd4dc3f96f1656248b93f"}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3f}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4}, 0x10) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 840.561487] keychord: invalid keycode count 0 [ 840.562216] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:28 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000040)=""/11) ioctl$EVIOCGKEYCODE(r4, 0x80084504, &(0x7f0000000000)=""/17) [ 840.740348] keychord: invalid keycode count 0 [ 840.740992] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 840.745708] keychord: invalid keycode count 0 [ 840.745899] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 840.930982] keychord: invalid keycode count 0 19:30:28 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x80, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x7ff, 0x400000) fsetxattr$trusted_overlay_origin(r2, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:28 executing program 0: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) recvmmsg(r1, &(0x7f0000002cc0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000000)=""/187, 0xbb}, {&(0x7f0000000180)=""/254, 0xfe}, {&(0x7f0000000100)=""/44, 0x2c}], 0x3, &(0x7f00000002c0)=""/126, 0x7e}, 0x40}, {{&(0x7f0000000340)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @local}}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/105, 0x69}, {&(0x7f0000000440)=""/150, 0x96}], 0x2, &(0x7f0000000540)=""/122, 0x7a}, 0x80}, {{&(0x7f00000005c0)=@caif, 0x80, &(0x7f0000000840)=[{&(0x7f0000000640)=""/229, 0xe5}, {&(0x7f0000000740)=""/60, 0x3c}, {&(0x7f0000000780)=""/171, 0xab}], 0x3, &(0x7f0000000880)=""/68, 0x44}, 0x2}, {{&(0x7f0000000900)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000980)}, 0x3}, {{&(0x7f00000009c0)=@caif, 0x80, &(0x7f0000002bc0)=[{&(0x7f0000000a40)=""/90, 0x5a}, {&(0x7f0000000ac0)=""/120, 0x78}, {&(0x7f0000000b40)=""/4096, 0x1000}, {&(0x7f0000001b40)=""/4096, 0x1000}, {&(0x7f0000002b40)=""/81, 0x51}], 0x5, &(0x7f0000002c40)=""/77, 0x4d}, 0xd6c}], 0x5, 0x11, 0x0) write$binfmt_elf64(r2, &(0x7f0000002e00)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x9, 0x7, 0x5, 0xffff, 0x5, 0x532be0a7a77fc55d, 0x2, 0x33b, 0x40, 0x2fb, 0xffffff81, 0xff, 0x38, 0x2, 0x8, 0xff81, 0x80}, [{0x7, 0x4, 0x10001, 0x80, 0x4, 0x2, 0x10001, 0x9}], "5b08bdc7ee7fdb5a39da1aa8590d157e4bdea835f67f342fe87b738d8843158a542349943ca2b87b2203a05d58c3ba09808a995dad66b5961206705b98a9b551e600aace70c9c800dab50198480a7a053831822ce3bb29d133a30553ae3dde13ed721e6f0fb3e06c503469e3a4c57a8f6fdcb5c6cec7df05b0a3933e8786c95eb8", [[], [], [], [], [], [], []]}, 0x7f9) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r5, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r8 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r6, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3be) setsockopt$sock_int(r6, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r6, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r5, @ANYRESDEC=0x0, @ANYRESDEC=r7, @ANYRES64, @ANYRESHEX=r9], 0xffffffffffffffcc) r10 = getegid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003600)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@empty}}, &(0x7f0000000980)=0xe8) write$P9_RSTATu(r0, &(0x7f0000003700)={0x83, 0x7d, 0x2, {{0x0, 0x5e, 0x9, 0x3dcd, {0x80, 0x3, 0x5}, 0x3140000, 0x6, 0x0, 0x1e4a, 0xe, '/dev/keychord\x00', 0x4, '^+%\xf7', 0xe, '/dev/keychord\x00', 0xb, '\'$+GPL+ppp1'}, 0x10, '$em1@em0md5sum[*', r9, r10, r11}}, 0x83) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 841.030549] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:29 executing program 3: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x0) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:29 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000012c0)='\x00\x00\x00\x00\x00egy\xc5\x8e\xcb\x1c\xf8\x8f\xca;\xa3?\xad\xae\x0f\xb5\x97ao3\xab\xcdY\x9a\xe3\xe5\xe1\xf4\x87\xac\xad\x80\xa3P\x8c\xea\x9c\xc7\x00\xeb\xedX#\xe34\x80O]\x87\xdd\x894\xdal;w\xf8\xf8\v?v\xf0\xb8\xda=|\xa4\xba\xbbiq!\xd8g\xb7I\x12\x80') openat$cgroup_ro(r2, &(0x7f00000000c0)='mem\x00\x01y7SwaS.\x06\x95r\x89\xc9B\xab\xe3\xfarent\x00\xaa\x1a\xfd\xae\v\xbf\xd8d\xbb\xaf9Q\xde\xfb\x1fY\x8do\xd1\x16\xce(\x82\xf1\xbf{5Z\x13\x15\x14\xd7\xb8\xce\xf20\x1e\xc0\xc2\xed0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140), 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 841.593910] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 841.900554] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 841.933041] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 842.512415] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:30 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = eventfd(0x7) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000850275af45bae87936a45750000000020000007f000001000000000000000002000100000000000000000000000000030000000000000002000000e00000010000000000000000"], 0x50}}, 0x0) r3 = dup3(r2, 0xffffffffffffffff, 0x80000) setsockopt$inet6_mtu(r3, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000240)='environ\x00') ioctl$EVIOCSABS20(r6, 0x401845e0, &(0x7f0000000280)={0xffff8001, 0xffff, 0x8, 0xffffffff, 0x800}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$inet_mtu(r9, 0x0, 0xa, &(0x7f0000000e80), &(0x7f0000000ec0)=0x4) r10 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/load\x00', 0x2, 0x0) write$binfmt_aout(r10, &(0x7f0000000300)={{0x10b, 0x93, 0x0, 0x356, 0x3e8, 0x3, 0x253, 0x6}, "250617975694", [[], [], [], [], [], [], [], [], [], []]}, 0xa26) r11 = fcntl$dupfd(r4, 0x0, r5) sendmsg$key(0xffffffffffffffff, &(0x7f0000000e40)={0x0, 0x0, &(0x7f0000000e00)={&(0x7f0000000d40)={0x2, 0x13, 0x6, 0x5, 0x11, 0x0, 0x70bd26, 0x25dfdbfb, [@sadb_address={0x5, 0x7, 0x32, 0x80, 0x0, @in6={0xa, 0x4e21, 0xfffff158, @local, 0x5}}, @sadb_x_policy={0x8, 0x12, 0x4, 0x0, 0x0, 0x6e6bb7, 0x5, {0x6, 0x3c, 0xe3, 0x2, 0x0, 0x3, 0x0, @in=@empty, @in=@remote}}, @sadb_x_sa2={0x2, 0x13, 0x3f, 0x0, 0x0, 0x70bd29, 0x3502}]}, 0x88}}, 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$inet_tcp_int(r11, 0x6, 0x8, &(0x7f0000000200)=0x4, 0x4) splice(r0, &(0x7f0000000000)=0x356bfafe, r1, &(0x7f0000000040)=0x400, 0x8, 0xb) 19:30:30 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000040)='cpuset.mem_hardwall\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000000080)=0x1, 0x4) readv(r2, &(0x7f0000000840)=[{&(0x7f0000000180)=""/249, 0xf9}, {&(0x7f0000000280)=""/128, 0x80}, {&(0x7f0000000340)=""/130, 0x82}, {&(0x7f0000000400)=""/227, 0xe3}, {&(0x7f0000000500)=""/181, 0xb5}, {&(0x7f00000005c0)=""/142, 0x8e}, {&(0x7f0000000680)=""/216, 0xd8}, {&(0x7f0000000900)=""/194, 0xc2}], 0x8) dup2(r1, r0) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'nlmon0\x00', 0x70}) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$devlink(&(0x7f00000008c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r8, &(0x7f0000000a80)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400002}, 0xc, &(0x7f0000000a40)={&(0x7f0000000b00)=ANY=[@ANYBLOB="200100002c35abc9f2c253274a2d1620cf5fb2ac03e4a55993b5c1b746925dcb92bb6e4b3f152c04abc60b0d985e1441404451f50f489031735f10a20e6fc0f2aec25f2de6db3938d3114276baacaea5dd3f5760f5d3c0369b6bf597a18c3d5ce726f61685713ebb26f8b38050ca6c10066c322c182ac464733a01c23a710bd387e8d17685320c43f557d298a4e4794501d66d0a6969a54af0b9f82513753cbcdf4a1da4751df17bb5f8", @ANYRES16=r9, @ANYBLOB="040029bd7000fcdbdf2506000000080001007063690014000200303030303a30303a31302e300000000008000300030000000800040003000000080001007063690014000200303030303a30303a31302e300000000008000300030000000800040001000000080001007063690014000200303030303a30303a31302e300000000008000300000000000800040000000000100001006e657464657673696d000000100002006e657464657673696d30000008000300020000000800040002000000080001007063690014000200303030303a30303a31302e300000000008000300010000000800040003000000080001007063690014000200303030303a30303a31302e300000000008000300030000000800040003000000"], 0x120}, 0x1, 0x0, 0x0, 0x10}, 0xc0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 842.590774] keychord: invalid keycode count 0 19:30:30 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) signalfd(r2, &(0x7f0000000000)={0xfff}, 0x8) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r4 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000040)) dup2(r4, 0xffffffffffffffff) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 842.640816] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 842.673740] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 842.693465] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:30 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000001880)={0x3, &(0x7f00000001c0)=[{0xfff, 0x2, 0x6, 0x2}, {0x20, 0x81, 0xe0, 0x6}, {0x200, 0x40, 0x8}]}) r3 = accept$inet6(r2, 0x0, &(0x7f0000000240)) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x7, 0x200883) sendmsg$inet6(r3, &(0x7f0000001840)={&(0x7f0000000280)={0xa, 0x4e22, 0x1, @loopback, 0x9}, 0x1c, &(0x7f00000017c0)=[{&(0x7f00000002c0)="095b839abab443bd679e27d41125f40344c61a5d50392a2f80a73345ee06d96d7d9fbda9e27be07933ceccfd4324ab7738e96e2e5c77971c2882c33d678534dda701752bd7577bddfb131518dd051fe138e4e5955bcb0eaa25f9682526d683a2acd98f7e8197f1a64fcfdcf0be33a2086ac9d8f542b8480a40d5d8ae5e295860b817ee7a60a5d774f6b8c212f4629f11c92d643c81cd45363839c0776c8154bd7725154bbe2594fe3beb0d31cc6f63d5efb4bb813ea079f5136aeb2ebcac7a38cb24f15786b9f7c74dcd92b047854823f1d26035302352da9c325389f6024a2dccd1b212a4030bf93f8e6f9d8da6543dec99bfe6e47390d0", 0xf8}, {&(0x7f00000003c0)="f9c265050913439b01d0a987f37ccb33ddd7c21d3f0379db86082ba490a4cb8d69949f9ae5192b4beb10c32e9276ca45612edc59cab4efda5ed6cb828a8ba92e1a08b53c904f430c405f644ac7e65fa6c6b93114b00a7e74aea8cbff9d17a161156e2a853ebb705a1567c8c2414973e008be4a5aca49b8c66a71c60d1bc431c88a6b1f5fef10ded3c48f4b1d7173a4b4fb57eceb98030c2f4d4cf9827986ba4c74d0fa997487423a45", 0xa9}, {&(0x7f0000000480)="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", 0x1000}, {&(0x7f0000001480)="4582e6594b30bde1d4c8542887aa93ed0775423b5ca1e23ea9bbc76a9d82", 0x1e}, {&(0x7f00000014c0)="e72e47992793643414b11ac408ba117b771b3b1769f37ab59b07203ce318265bba738b8c01e4993aaf5221a564ead2e8edc0471e4296dba041659402a8b030f01d2c89f2eb9bde5f5e74f4ea0f79cfe5e9273ce52c1525b58a40df65c7ef5e6e96964db2c6eae6910a3fd2fb77977c5d70d4b66bdf223a5fe5984e6d3d48baf3ab1c731843784743452608114c05afa401c4d81132e88b1379b4e26c2f47f5b58d931086d7afa2", 0xa7}, {&(0x7f0000001580)="a67c83cec5ce2c7dc85e8a8ca287b77437f8eb63e3babbbde599c650bc3303add630008675976461a3302eb5dfb0d47a05e545689781cd8c63c5aa995a0bd8154b5877f2539a2adbe9b1f9eb5ed16244cfdde8d350d14d06c2b5dedf85bff604a589e233cdb174f304dfe4f69c462b69b4b074d858ce12a81683b11a6828d59bad9a417511dc3aa42d462376756f2de3ff7faf181facacb962f80d0337798106d39e08da1c53a22e94c9842748c28544952ed505efc93f267610b997dffe7c1fa59bac5380fc3d3a9760a4bdd37edb2953d90ecfc76163d8190adbefde1a6c851d28d59ccda75795bf725b6e", 0xec}, {&(0x7f0000001680)="29fc9f187defafdb8ab6c262876585b2c00c81a04f72bd5dcf3e97cbe2fec300b7a9d859a2d391e0b395a097d91e39a8aef64319421f0ac1d9d3349f514099f857c4eebfadc58a7f52c67bd75fdf040d3046be975fbce53f2661c14cc0a21cfbd829a698997436f7488f", 0x6a}, {&(0x7f0000001700)="9294020317bd31fdf98dd92c33736f179b02e944150de425468befaddcbc28f756ddc6ee85cb4aaa2c1c1d2063ed50ac4a326356be42ee60ba94c294f05d03054a3dc3556baa129d1f95eee81504da4cacf341eba35517c7820381e9c7bc5de85c5d739f089de8e68066e47a3edf04344d7b059c5c88b3d3af3a6fc9c699453df783d1fdceb8c4e1b8b522abf75ca1b6901f7f0088c6d9068cead3e187aa0e39ce56f15e140c19e863d8d7186fe3d8873df0c69126d371febd0854ab8205", 0xbe}], 0x8}, 0x0) clock_gettime(0x0, &(0x7f00000019c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000001900), &(0x7f0000001940), &(0x7f0000001a00)={r4, r5+30000000}, 0x8) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r7 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c00, r7) r8 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r8, r8, 0x0, 0x27) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000200960000000000020000007f00000100000000000000000200010000000000000000000000000003e4ffffffffffff01000000e00000010000000000000000"], 0x50}}, 0x0) r10 = socket$key(0xf, 0x3, 0x2) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/vga_arbiter\x00', 0x50100, 0x0) sendmsg$key(r10, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup3(r10, r3, 0x80000) fcntl$getownex(r9, 0x10, &(0x7f0000000040)) ioctl$LOOP_CLR_FD(r6, 0x4c01) 19:30:30 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0xfffffffffffffd2f) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TCSBRKP(r5, 0x5425, 0x446) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(r0, 0x0, 0x0) 19:30:31 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 843.174205] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 843.335350] SELinux: policydb magic number 0x93010b does not match expected magic number 0xf97cff8c 19:30:31 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = openat$cgroup_ro(r6, &(0x7f0000001940)='cgroup.events\x00', 0x0, 0x0) r8 = syz_genetlink_get_family_id$devlink(&(0x7f00000019c0)='devlink\x00') sendmsg$DEVLINK_CMD_PORT_SET(r7, &(0x7f0000001c40)={&(0x7f0000001980)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000001c00)={&(0x7f0000001a00)={0x1e0, r8, 0x100, 0x70bd27, 0x25dfdbfb, {}, [{{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8, 0x4, 0x2}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8, 0x4, 0x1}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x1}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8}}, {0x8, 0x4, 0x1}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x3}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x4, 0x3}}, {{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, {0x8, 0x3, 0x2}}, {0x8}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x4, 0x2}}, {{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8}}]}, 0x1e0}}, 0x20000000) r9 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r3, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$NS_GET_USERNS(r10, 0xb701, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:31 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140), 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 843.433073] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 843.465958] audit_printk_skb: 81 callbacks suppressed [ 843.480345] audit: type=1400 audit(1573846231.395:2514): avc: denied { read } for pid=1083 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 843.629848] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:31 executing program 0: clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 843.931619] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 843.942003] audit: type=1400 audit(1573846231.875:2515): avc: denied { create } for pid=1083 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 844.040728] audit: type=1400 audit(1573846231.965:2516): avc: denied { create } for pid=1106 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 844.046584] audit: type=1400 audit(1573846231.975:2517): avc: denied { create } for pid=1103 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 844.056467] audit: type=1400 audit(1573846231.975:2518): avc: denied { write } for pid=1103 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:32 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x2, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:32 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) dup2(0xffffffffffffffff, r0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 844.136539] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='/de\x80/loop#\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, 0xffffffffffffffff) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/prottr/current\x00', 0x2, 0x0) capset(&(0x7f0000000080)={0x20080522}, &(0x7f00000000c0)={0x3, 0x8, 0x0, 0x9, 0x100, 0x7f}) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 844.283684] keychord: invalid keycode count 0 19:30:32 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x200, 0x0) pipe(&(0x7f0000000000)) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/current\x00', 0x2, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000002380)={0x2, 0x400000000000003, 0x0, 0x0, 0x20a, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x201, 0x18, 0x9, 0xff, 0x1000, "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"}, @sadb_x_policy={0x0, 0x12, 0x0, 0x3, 0x0, 0x6e6bb8, 0x5, {0x0, 0x16b00e4f3ddbca6, 0x3f, 0x6, 0x0, 0x7, 0x0, @in=@rand_addr=0x3, @in6=@loopback}}, @sadb_address={0x2000000000000027, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e20, 0x577c, @dev={0xfe, 0x80, [], 0x19}, 0x4}}]}, 0x50c}}, 0x0) sendfile(r4, r5, &(0x7f00000001c0), 0x400) sendfile(r3, r0, &(0x7f0000000080)=0x2, 0x3) [ 844.415414] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:32 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 844.610973] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 844.621803] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 844.686832] audit: type=1400 audit(1573846232.615:2519): avc: denied { create } for pid=1124 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:32 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) write$P9_RUNLINKAT(r2, &(0x7f0000000180)={0x7, 0x4d, 0x2}, 0x7) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) sendfile(r3, r4, 0x0, 0x8001) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:32 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(0xffffffffffffffff, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 844.954129] audit: type=1400 audit(1573846232.875:2520): avc: denied { write } for pid=1124 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 844.990668] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 845.015590] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 845.039125] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 845.190749] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:33 executing program 0: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="020a00000b00000000004d00000000000004000a0003000000050000000000000000040000000000000200000000000000020001000000000000000000010000c0030000000000000002000000e000000100000000000000"], 0x58}}, 0x0) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) splice(r1, &(0x7f0000000080)=0x7, r2, &(0x7f0000000100)=0x5, 0x0, 0xace8d9ae5f9977d5) ptrace$cont(0x20, r0, 0x0, 0x0) ioprio_set$pid(0x3cbfc4995c4288b4, r0, 0x29) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 845.340795] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 845.349087] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:33 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0xe9) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000040)={0xffffffff, 0x2}) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 845.439491] audit: type=1400 audit(1573846233.365:2521): avc: denied { read } for pid=1124 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 845.550786] audit: type=1400 audit(1573846233.475:2522): avc: denied { create } for pid=1149 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:33 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='t\b[u\xef\xff\xff\xff\x8c\x00\x00\x00\x00\x00\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 845.733581] audit: type=1400 audit(1573846233.665:2523): avc: denied { write } for pid=1149 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 845.801424] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 845.819265] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:33 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x8001, 0x60000) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000040)=""/17) ioprio_set$pid(0x1, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = perf_event_open$cgroup(&(0x7f0000000080)={0x3, 0x70, 0x8, 0x9, 0x1, 0x4, 0x0, 0x6, 0x40000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x193, 0x1, @perf_config_ext={0x80000000, 0x9}, 0x10018, 0xd88, 0x7, 0x0, 0x8cd, 0x2, 0x4}, 0xffffffffffffffff, 0x4, r3, 0xe) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x2, 0x400000000000003, 0xcf, 0x0, 0x11, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x2, 0x1, 0x0, 0x6e6bb2, 0x7fffffff, {0x6, 0xf32f4157e0a5f118, 0x3, 0x73, 0x0, 0x3c280000, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x29}, @in6=@mcast2}}, @sadb_sa={0x2}, @sadb_address={0x5, 0x0, 0x32, 0x0, 0x0, @in6={0xa, 0x4e24, 0x3, @ipv4={[], [], @loopback}}}]}, 0x88}}, 0x0) ioctl$FICLONE(r4, 0x40049409, r5) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:33 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup2(r1, r6) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 846.081409] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 846.088872] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:34 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/125, 0x7d}, {&(0x7f0000000180)=""/4096, 0x1000}], 0x2) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) timerfd_gettime(r0, &(0x7f0000000100)) 19:30:34 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) sendfile(r2, r3, &(0x7f0000000200)=0xfffffffffffffff8, 0xffff) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) fsetxattr$trusted_overlay_opaque(0xffffffffffffffff, &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$UI_BEGIN_FF_UPLOAD(r6, 0xc06855c8, &(0x7f0000000000)={0x4, 0x6, {0x57, 0x7, 0xbd, {0x7, 0x1}, {0x1, 0x84}, @rumble={0xfff, 0x754}}, {0x51, 0x0, 0xbd, {0x1f, 0x3}, {0x0, 0x5}, @ramp={0x6, 0x0, {0xc3, 0x180, 0x7, 0x9}}}}) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r7 = geteuid() stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r6, r7, r8) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:34 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(0xffffffffffffffff, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:34 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000040)) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:34 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:34 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x400080, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8041}, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1480400}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x200, 0x70bd29, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8018}, 0x10) [ 846.857686] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 846.890340] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 847.160859] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 847.168326] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:35 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(0xffffffffffffffff, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:35 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fcntl$setlease(r2, 0x400, 0xd0cc6237f6d292bb) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) inotify_add_watch(r5, &(0x7f0000000040)='./file0\x00', 0x4) read(r0, &(0x7f0000000180)=""/252, 0xfc) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:35 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x2, 0x100) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f00000000c0)={'\x00', {0x2, 0x4e20, @multicast1}}) ftruncate(0xffffffffffffffff, 0x1ff) ioctl$KDGKBDIACR(r5, 0x4b4a, &(0x7f0000000040)=""/88) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 847.639022] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:35 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r3 = dup2(r2, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) write$binfmt_misc(r3, &(0x7f0000000180)={'syz0', "5ae8462e734ac992f70c3ca9e49a2d2a102e55532712ca26086576f07f19bf11bdba842ab877afacf39b44055f8c4c2526d841c4aeabab5c17f6b543422c47c859c982db79b4ebbf77a4dce4a89577ba26bba7d17a109dd69f00656c8b47cf5f4b248fb6f2fb8b2f"}, 0x6c) 19:30:35 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) sched_getparam(r0, &(0x7f0000000000)) ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:35 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 848.205451] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x1000) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x503984, 0x0) sendfile(r3, r2, 0x0, 0x74fd) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 848.252197] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:36 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x200000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:36 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, 0xffffffffffffffff) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 848.583144] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 848.603127] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 848.771452] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:36 executing program 0: nanosleep(&(0x7f0000000000), &(0x7f0000000040)) ioprio_set$pid(0x1, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000080)) clone(0x16000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 848.987692] keychord: invalid keycode count 0 19:30:36 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDSETLED(r5, 0x4b32, 0x10000) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:37 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = getpid() fcntl$setown(r1, 0x8, r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$eventfd(r5, &(0x7f0000000140)=0x200000fffffffe, 0xffffffffffffff35) r6 = dup2(r1, r0) ioctl$FS_IOC_MEASURE_VERITY(r6, 0xc0046686, &(0x7f0000000180)={0x1, 0x1000, "330750173b722baaf00e7a073feef8ebee9b446096caffe39cbd25de1fc115325ba41524cd8382e461d4eafb6975d7e5334048e9a2b74d12bc6f1e79611cc48c828aa378994a0c25b1ff44b573cacc91a31c1365bfcadce2c9a5ac13ffe3e1d98b467adffa81630c80f121cef4661c2a0650b80e5f04465028dbeab266075e310c6f902f3cd1cd84759f4a734c6b75ad03e433d13c80be00a6eb2845abadebbfc5df3b52073eb51a4e3c66ca09c6f77953f4b9c335f167d14ddbb30139b3ea0f990b03593ca6a412fe07076d77830d2d2c44eb43d8f403e78ed16d6874838977f5d63c0e1b289e272f21f4b82c0941540f81a6759b060de46ec8fd7e49eac1a918360a7a3322e8576680691263db620882ec3443f0a1be1869a555cb14514734c6cf1033b462f0dc161d5426e6dc5d4cf310445e1ae7b28d46039a73e0eebfa764a941025a261ce1bc655a9f5ae0178ea4ae2c7e3ee4ca4416b91f0872239540db298dc8155e22f0e70d7745eeed33b727fc18e7fb87dc711bf4ffbaa0883af97e7178fcebafb288063e32696ad0514358a490dade4c6a989ee31e004f62ec8481cb1031bf749d70f744ce861dfdc4d8ff4cd72150a17cca1b7106d26e686688f6442d987f8745ad20b166f9d7cbd0b4aff014a9f47323b278c3692c2c19d65ec768bbb147ba161bdb8007fd871d0977bde6cdd648578f4cead794de66b0192cc1678654f5d132bebd886aa7a9e41df15ad0c83644aea1f3c44d648c04853a6de9c04aa6af8d210e5d6345516665b090cc80413fd7307b8c53012dac631cf37fed6a1db6c38e9b7ac2bd946387e373ce12628a6abcf3d0771d04c05d9e05a44b96f4c567f06a8ebb5290c05ff76b0f83db208a23931541bead0cec9606041f8f5c3d20e66b7e6b3d4605f06830786e6e39c65a1bb339c16ff824b893862e5dd4cdfc1c2925ea721c97e39892ca1bf38fa09431d0fb9c576616a357ce69fed64f1e7a2bd2a2b4adfcbc3d3ffa398b936cd8ae528c9cc5d86e880b64cd0035fddc24401f507ac1f79951c236b598a1c7d943fa39f83106babc0704c5b3ab72dccf56f938d415fd71dd8851a29ea45e296d207b2bbb465da37f9a708aa45b94f3b7fc5d2904dde8c09ffbccbadb0f12b267b1d404229ab375afdfcbcbbad4f0dca567088f5c687558abae48b95ab5a470020193dfb8bdd1730a42bf3bdd4e498c8b051cddbd8ca54a36f786172438010e2738ca37b609af82f861a85cd5b03e9fd553ec543f8683f157dc0232d273645012a0a09b3acd1e0bb241e079d057f01fd3177ac9b441d01a7ed452c412739ebd0182fa7a5b0def2f88d5b7eb0bb55f5ccfb92e5d462f1e8c3e738de846bb9db6fd4c3662275a7e25c9f1bcf8df83738411dd51aa3e3c4f4edfadbb75ce9d52795581b41bfd9de459967d6fc38518852548a5542bf96cce77b101d58be2b0704bdc1c2e1a897591c88d4e8f2311060ae61fb24e13ab438b0bc4310169616f2b49a3a811061d78009a396264f9e6f4e57179cf6d854cddb1ce502fe7c853d7de67998c34ded7b3f7c143834327200acfd0316987e7d58aef8f3092ad66e5c16c3ae75bcd53216b2e990e845b121ca9736ef7e78271e6432abddf5ca6fac23a61cf6b56942c2b6f020f45590aae95ee66e43d7dbd575fc96998ce6fd54400b3cabf3235a1e485a81247388395b0631818e953f548626bc59cab82199616e377c4e337ef4351f05c70dd3a4b6023ef4ada2d133a6c1dcea5c6bc6bcfe1242957f1e1bdd8376c5e77febe4604654efbfdfa2646529ede40e81000f17916028da00b15c6ddd6252795c4358d5558a3f4e186bf69574800bd3d238e84cb8e8a5c9c9977bfce05dbaf711cf994cf95ce6a976c086de4c86281df709aebfb991a9188bcbfb4740965b752976ed555f59a74c6b4aebd93c408f4d425d54a9426e1cb7e333cf1ac94422e322d6f2aa11c51c17ab424374584d230092ccd94db3f36222e5bda20cbeba50c99b8da9daa2760cfb216073674e5f094a1c7adbe8e1364633a5f69e5d15d7514303d73db8dabb3934a4055c54f135f712bf2493fbf9ab9e864263f211e2dfe6b1a47940c2b756bc621169a36244483d8744dc8ba3c7e3297539bedcdb3d6a7eaecb178fe4c48b17b1977c4f937a1ecae2f927d9399c877c29abafca941cdfaec301898d6a86522b7edfcdacef53a1d54452103a91a3e9e5f9298840ba0ba6f5b3c62ed7f40c36e0dcf20ab5410784318ffbffba74f44646cbc10c28a22ffc600653806175bbe1e3216ad056408a002d286c9496fabe0d84ae41191caecad4d7e859cb323d9b737e7d66553ee40c03f86b93ef1a02b0a7ec1edc458cc484ca14b31a46530f8d4262b08a0d5a98d513782be68090a84737b38ad19b0936a52bca48c620a3001b5336f320b90d36cb9320004c06e0688f49175ff8427b092a234ca9fc401cd9ad2b7625bd31d27a48f144296d727f1b32538a527f182f1ca506ff3da849321c4ea1420fe38d96a8a0b357053857fe7d390496546d9aafa9b1c2794c076cb0028492c90db830df1f1a338c088db9ab26cbf48997cd034ca12462b79c5235c4e093d2de93abfabbf78bd881421f9cebc6065ecc6feb1de838c7dd7bb16bd06ff0c9e406167e2571429003fae10662a802e5d4cbf3e2c74e23b2dc79896bb569ec84fd5bad1a47be912ec6b8aa214217eb26313d3814d2421f31c6fb0a2b3d2c136f974152df5313c94aacd80bbcb9061c91365aee8c7544ab2f2088a192c3e5eff1ee841ed5cd74358734791ca61ad9f56e281b2a26ffc3d68afe7652d73ea0f23dab60b2a23bc6c3465d23ef76d58dc0cd1f4e5be35f4e913499caefa7075d21814f4eabc2f27f6d6bbe410bb87422234294e4e7f671dabc8001f66aec7600c93862394a59b9ef90dfb8e52870ab58a9be13290b61ba52b1ff00e52071de8c527d7856ab01707580e951f9fc78ddd98cc3bd58184278d5f951fa875c599f71a0512e1063dc2ab1525792c064d93519fc88461da1b638b98e223ec6fc7a83cd3e5501539bc18fa691d58820dba996571dc66ae675355b01ca38247a7ed8f9362422070e3f42da2359a37346f709e5a22059a653125f07f533b5aaa32b9c2e3ec20e8467c5bed2c5deab5c48e53639cea3ed869cc537f26c3f1a6f2cc2e7e8587568dca5817f65e3dfda735a1a31f141519a19ba3cf82ef05b8d6b003e35d9d51b133fdfd8594df813a4bcc5b17037af946944da2036dc2924993607173c6b843d768988059103a8964fa0023261ccde90124fc2319cd4c319b41c52e1689d7505c52448e63d3434abb3432a52a2f0e9beb5f7dad5b3208d1a97d88f9235aaea182e05cd3b95e92186aca90fbfa4481caab4f7827e0e8bd47324c0eed7d19947ae9f4143d5e29557d3b1ae3754b625aa9922ee99209f1e20cb048d1473016e86eae0950e827fe1428d92c9669a0bb4cf4c72fe76f95d2b12eb271f24a2d769d67c045fccc147c05a8547a09ba99e44211496ca784a8d0cf678ab14e5b4aaa01643913933a70ce6839b05c3194e14ffc37ea6a614ca63b1751596d58d75576e04b0f8eb6c99901be84af85576bcf73be676516e1e5c5dade927443d5e68756617a182ed63afedbb11b0690252bd221650e25591a3bef564da2394c602e97112cf0c3b8302646d53981976e80bd9c6e66e422503802c458bc569458e22d159f0127afdf4a39dc8329df8d8d8e4481657de3cad02fdc3ad6095a188a303ec35b511451cee31dc27ee1ca42c19e96f733a32f5b1c85cb590455746e4a6deb9233278281189899a9104af0a2cfe898d40dafb5aa838bd410b55ea94782a15c0297d65207a835253240e8d6a8df7840dd7e1666ec2120182fa015e7cc40ead063d6b728625fa5649da339edbf0dbe08f5af1bddcbe87be69020ea0bbbf8041e2474b23e585b4e56794870b2898edcc976af98e6e574c0dcb91955f9de5ab8112db25fde4fab933cd2f137c94739d229492440a05381fb29b9259fa2c1f85d53a957a8bb9cf0b132314d934b4a6eed034dab2646925f5b00a836daf2574772631a3ac017181f4ebe96a3daf7a160b3fa31909948bcfd824ea69f167273edff020a39a8554b635188ec75606d5519ae575b904553394df1fcea0eb07c0c08efb51fcf83ff829fabe99e9c4e11a8a1ef981aa1ce13e2ffc6f4ccb2e2f36e2bc90bf383ae319607574433a3cdc874d77e9ca1846281a17fd0160def881b22b6ccf65971f8005b005f7e41841d5001afb53532be804a564bf1af567fb0ea369154ef1fdd1ecae71bd1a3e4a549c4375261a5da7169796e3fcbe3292a7723247cd80a401417582be241d459bec2a974e81552f670c4a94bf7303c0da259c27a95951dd44a887ab4e6bc6bf8225e4ffff28d3ea3a58f9226fe3c586e499fedb8a346427a2ef636d54928f50266ba8a78afb341d6d9a1252ef905139974364e3b76463b50930ab1769237802957ba1c039819d1236f48ceae669e41de3a1899bab54845688881090b6a7338d2248f47eb8cc58c2486b4a650bba26f415bf2e26a8bce04381cc87ef22c38a277f5927081fd6f4b7170667902c5e3911b3cfde653a51641f8f399b450849d9294eeb9cadcc14cc429fca1541ce0cbb88297f98c9a6f9b48685a400162efe59bc0a07052ba1e2a28fcce93c94e73f0e158424f9046d9ae643db1c37122a464fd2411001f039cbcb689567a037a4cfa70746ea58eea5eb87928ad982609f05bcddf479019cf399e8acdf02853622fcc4d8ce32d1a480411b2b355e4e8ee7454b5a0dffb297c956dbcf21214dcaa9526e10e586099e530c1e1f436b8f0d0c236d805d03d7d880e9f905f91335d3371bcf1a5c8fa7b1560ecc229cb2be4be6099cf8f72856307a7b996f18fce1468676a1b6fac16e78e5defe0c6e49dccc69e7a38131b5393421d860095d164847b757adf428d67055e80ff79841ac5b2dc544ecf077baa52ff02fc71d13d46d201428188a1456bc5d2cc766c94adfc24f4c8c96a54d0a8a22d8907b6e9376d220029e4b14ea394df7e842a1dacab0029d0a6b72384250bc368c47550e89f3264f1f2ba71ecac2c23d5cf9316288157d504d9cb3cf592bfa73ea094eb37a8f8ef72faa0b24c9031c6aa2328bd68ebbb106e34d2b0f2d6a8656caaa9ec241dcf5327b9587ddf17031fa5549fadd00a6b40beeb697fa0d101d581fb82b751b8e003e701fe437a5e92b8131d2b74dbe80be743f0ddb5130418fa6ea39f9068b95e51e2fab807182e603d074eea33c4e8c5a35d905c6d8229378e97429ec6b9670accc5cbb213ad496a8e0a8959d6939f83db17b3f6a437fdaa6a9e775222e9cce974197a952d0a1f156408484765fa5346513c757a53ac318c565297589bf248534cdf96370ac646b3132dfc8e3fd3b1b6604f39cc5ba6e11315dceecf9c8e132503efb337d25f820b5f697e066e43815383e98e854f5fa67608e42194bc13cad674b6d0924dd3ef1e5a16dae8fc4677aa5bdf57966152bde2ebe5d44c248bfbb509835e162af34166ef3f1b0ee69de78ef2f78cb67c8fe03606bc620b28034b0de58cb85cdeee4660ec343a74ab65eadfe9f443cede8a0a7862f2b1a8f864043b6e170f3d6a98411e60fe805652e54da14cc637b059e71458dcd3740bdd45d8c4703983726bc5e3c31cbf582493fd7158db8ffba3b7e3ebc7f39daa19b868c7fdb64dd3a59c6c3279c0cb8b397ced14b1a8d5b24a24a08f831d"}) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x8000) 19:30:37 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000040)='./file0\x00', 0x400) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 849.100922] audit_printk_skb: 72 callbacks suppressed [ 849.106156] audit: type=1400 audit(1573846237.035:2548): avc: denied { create } for pid=1262 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 849.272264] audit: type=1400 audit(1573846237.205:2549): avc: denied { write } for pid=1262 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 849.301420] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 849.485706] audit: type=1400 audit(1573846237.415:2550): avc: denied { create } for pid=1227 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 849.572472] audit: type=1400 audit(1573846237.505:2551): avc: denied { dyntransition } for pid=1276 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 849.631907] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 849.656420] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:37 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000740)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r0, &(0x7f0000000840)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000800)={&(0x7f00000007c0)={0x1c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x24000001) memfd_create(&(0x7f0000000700)='cpuset;]/em1vmnet0wlan0em1@bdev*\x00', 0x4) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) r3 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/access\x00', 0x2, 0x0) pwrite64(r3, &(0x7f0000000180)="208f5b5bc6861792e665f1ef95a46bcbe1a52c308c1dc6ce058792b29ba8c862e0cb887ee68daa7f53b28e3fddaedfc9d22474dbaa3c726674d577fcf757c86a3d014cb565096b3f77ae5e2f3a7d33aa8f27f540efa1f757139910d376f6b7a7f1836d930f9dafafb3fd9e1f440ae0601dfd6de4373fb5d41bb2c944bdfd64b7ff2863c8c721fb2232644924326af45132538fef02823ada4d1be6ee386ce99ace28b7230239fb0f2ea562615104c36b2e3e4cba89e068e1b44c06356be7c7", 0xbf, 0x5) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000fbdbdf250300060000000000020000007f000001000000000000000002000100000000000000000000000000030000000000000002000000e00000010085ed9be5000000"], 0x50}}, 0x0) writev(r4, &(0x7f0000000680)=[{&(0x7f0000000040)="01a10ccf9350f90f2f4c17b3d9e83cfcb6d542986fb10866cea724712006f4f2f993881e9c6512d73bc0985eeb94dd2396769415abd3901f241f51d22c25026f419b2ee101a9358eea5507c85311fd880ad7cc9a03f0c98a66c5a510fc764f37cb2f8f69fa1e5f7c066136992f155b", 0x6f}, {&(0x7f0000000240)="6a3d6a2d71e380bc6514a156513784fb9a0f99ef9f3d4944edea720d607bca8244ea10cea741a1739f7bc914407adfd38cdcd0ae093dc10a63c25895e1f312fcb420bf959d1b2cfa4d1d2b4b7b49b5e066a5db1642bd8b9e829c70e45bb8016e2fbc991878835421", 0x68}, {&(0x7f00000002c0)="9d4e86aaeb965a60ac56613db31a3df8c0d63681576a360193f0c0fc3185355b3a74ca4b708ed2198149b81854f45af3a5f6819d8be44f08040dca0fbe83e942249b177d3a2f8786ab91ebff035e4e0516fb452068abdef3bbd48b6588f078b68eb29aa4b1b0b9265552ab88424e722539e837697ce018a489caae0a7107ab572fb202a34cc67badf7da5a9f4122ed58af270be72f205db4d6640e5fd4cee851a29c35aed8a3bb9bb1d8322630dd7e77fc6e629e33654234267b651e4aea9188b4250d42e94ed70323c0d45b001a8a", 0xcf}, {&(0x7f00000003c0)="e68d33797c6c7a0420cae2046260949e95b956928cdcc0beceb9dbc3e83b406ea0a51d5aec65c996e4f543c9f63853a484c85941f651c2bb3c506e22906eab25084af75873b6e61f72c41d1e566134cc0ff805f76ef542908dcb07d554892e0ffeac6affe3cc3f1ed8cebe28bb64978a05deb2e0ae4f1139d0c3780461b8e6804232d8250fac4d543597f860ef14adb793e9fe847745", 0x96}, {&(0x7f0000000480)="69ed6b614faa2b21891faa86e6b7446493a4d7937d4aa9ead8754b73699e98fafa2124e194932c69d8e6e5352db55da801c4b342f44ca2209e6f4dbcc2c6ad9fcff833b97c2fc632ac42ee4e8e2cd1fd52780209a47a6cb0fdcc1567ec6ab466bb25133ea2853d30e40f8352c8ccae269a00111700094d61151d9d739acbf70b82007b3378bb6588fd2394fdba4da33e8b1ef0653f8d78f39c402cf4dc0507df29", 0xa1}, {&(0x7f0000000100)="0499ce6e060c4451c4f9045cb0f0e9eba4ae2504dbd6d32921bf23e07d27df76ec4328df0bac26b703925dbc881925009f0477c4df1210daf90ffda9", 0x3c}, {&(0x7f0000000540)="989fc04f8b740d6e79c6c8958ef12259d3ff076c2a2ec93286bb02ae92e9b13558afebe339eb5334850a363053d3ef23c79bc474779218f2c4072f6f5db987ffca3973cc4675bcc553787669a8b87e0a67062fabaaa4086d6ce1be", 0x5b}, {&(0x7f00000005c0)="6012b858ef91c3894a4e417797521228bf70e9472fc96be45cfc14a4e1d75a3fa0eb28428cb1d52cdde5baf0b619bfd7c2d16a6d5588e07daa8a3149a2264e68bced69c627143490357a5149feda56df50e9cdd614f11361a0df2faf9380ca6f689c6861aeef17270182601a586b25291374b5f12aa6115855e4477584cd5f5dca7aa3003b95b338555340a325dfeec3818a400b8bd8e1359d390277c26116984c0160410ea51de13afe76a4", 0xac}], 0x8) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:37 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)=0x0) waitid(0x2, r1, &(0x7f0000000040), 0x80000000, 0x0) 19:30:37 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, 0xffffffffffffffff) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:37 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$UI_DEV_CREATE(r5, 0x5501) sendfile(r2, r2, 0x0, 0x27) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x8003) ioctl$BLKTRACETEARDOWN(r8, 0x1276, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 849.982324] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 849.989735] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:38 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) getsockopt$inet6_opts(r2, 0x29, 0x37, &(0x7f0000000000)=""/58, &(0x7f0000000040)=0x3a) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4000, 0x0) flock(r4, 0xf) [ 850.252280] audit: type=1400 audit(1573846238.175:2552): avc: denied { create } for pid=1296 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:38 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$sock_inet_SIOCDARP(r4, 0x8953, &(0x7f0000000000)={{0x2, 0x4e24, @multicast2}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x5cad5b28bdca0c61}}, 0x2, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, 'bridge_slave_1\x00'}) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 850.318535] audit: type=1400 audit(1573846238.245:2553): avc: denied { create } for pid=1298 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 850.420377] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:38 executing program 0: r0 = socket$inet(0x2, 0x6, 0x40) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000001c0)={0x3, 0x7f, 0x7}) ioprio_set$pid(0x1, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000180)={0x3, &(0x7f0000000100)=[{0x1, 0x8, 0x0, 0xba}, {0x1ff, 0x1, 0x1f, 0xbdd}, {0x9, 0x7f, 0x80, 0x800}]}) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000500000000000200060000000000020000007f000001000000000000000002000100000000000000000000000000030000000000000002000000e00000010000000000000000"], 0x50}}, 0x0) r2 = accept(r1, &(0x7f0000000000)=@ax25={{}, [@remote, @bcast, @bcast, @netrom, @netrom, @netrom, @null, @rose]}, &(0x7f0000000080)=0x80) ioctl$sock_SIOCDELDLCI(r2, 0x8981, &(0x7f00000000c0)={'vlan0\x00', 0x2}) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 850.478754] audit: type=1400 audit(1573846238.405:2554): avc: denied { write } for pid=1296 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 850.494323] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 850.552860] audit: type=1400 audit(1573846238.475:2555): avc: denied { write } for pid=1298 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 850.640590] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:38 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) sched_getparam(r3, &(0x7f0000000040)) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:38 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, 0xffffffffffffffff) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 850.951148] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 850.959721] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 851.013867] audit: type=1400 audit(1573846238.945:2556): avc: denied { read } for pid=1298 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 851.100837] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 851.160675] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 851.294502] audit: type=1400 audit(1573846239.225:2557): avc: denied { create } for pid=1298 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:39 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$packet(0x11, 0x2000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x100048}, {0x6}]}, 0x10) setsockopt$sock_int(r2, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) bind$inet(r2, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) connect$inet(r2, &(0x7f00000002c0)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) accept(r4, 0x0, &(0x7f00000001c0)) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x27) r6 = getpid() syz_open_procfs$namespace(r6, &(0x7f0000000040)='ns/net\x00') ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 851.400783] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 851.416846] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:39 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = dup2(r1, r0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r5, &(0x7f0000001080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) setsockopt$packet_drop_memb(r4, 0x107, 0x2, &(0x7f0000000100)={r7, 0x1, 0x6}, 0x10) poll(&(0x7f0000000000)=[{r2, 0x40}, {r3, 0x2822}], 0x2, 0xffff) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:39 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x100, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:39 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) socket$inet6(0xa, 0x2, 0x40) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 851.702425] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:39 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:39 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xb4e202d4dedb2ba1, 0x0) epoll_wait(r0, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}], 0x6, 0x80000001) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$FUSE_GETXATTR(r3, &(0x7f0000000000)={0x18, 0xffffffffffffffda, 0x7, {0x6}}, 0x18) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2) [ 852.184218] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:40 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) signalfd(r2, &(0x7f0000000000)={0x3}, 0x8) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 852.591533] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 852.599750] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:40 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f00000000c0)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ff6000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff3000/0xd000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000040)="96a27ba416cc2fd89945f7b6e4d09b36831cab2907af890596160f8a182768ab8e9ab0252d0f426846ca42868e7990590029a09037b57e7de427bacc5550c5c102959675481b51d6a02efab2b0d953b650d519eb41ce4bf0db8477d81b89543afa551db3abf4b8d14d9866d15cdd4530a4edd37a537afb", 0x77, r0}, 0x68) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000140)) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/access\x00', 0x2, 0x0) fallocate(r0, 0x15, 0x1, 0x4) [ 852.791603] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 852.799006] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 853.000591] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 853.110994] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 853.118393] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:41 executing program 4: r0 = open(0x0, 0x0, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = gettid() r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) ptrace$setopts(0x4200, r1, 0x7, 0x0) tkill(r1, 0x3c) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) timer_create(0x1, &(0x7f0000000100)={0x0, 0x40002, 0x3, @tid=r1}, &(0x7f0000000280)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:41 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 853.661511] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:41 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$inet_mreqsrc(r2, 0x0, 0x28, &(0x7f0000000040)={@loopback, @dev, @loopback}, &(0x7f0000000080)=0xc) openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r4, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$eventfd(r7, &(0x7f0000000140)=0x20000100002001, 0xfffffffffffffdf2) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:41 executing program 4: r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000cffff0)={&(0x7f0000000840)=@allocspi={0xf8, 0x16, 0x9, 0x0, 0x0, {{{@in, @in=@broadcast}, {@in6=@mcast2, 0x0, 0x33}, @in6=@loopback}}}, 0xf8}}, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=@flushsa={0x14, 0x1c, 0x301}, 0x14}}, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="21563f6c2110150ed1e2d98d637f09dc45cdd5421ab6978a6407e9b8664922d5ce21864b046225326e9e91b9e4e88ac587816d4eb6c29632c3", 0x39) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000000000020000007f000001000000000000000002000100000000000000000000000000030000c90000000002000000e00000010000000000000000"], 0x50}}, 0x0) splice(r1, 0x0, r1, 0x0, 0x30005, 0x8) syz_genetlink_get_family_id$net_dm(0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 854.188928] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:42 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'veth1\x00', 0x1000}) 19:30:42 executing program 0: clone(0x92100200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) [ 854.390442] audit_printk_skb: 42 callbacks suppressed [ 854.395672] audit: type=1400 audit(1573846242.315:2572): avc: denied { read } for pid=1408 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:42 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x400000, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) dup2(r2, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 854.550515] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:42 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = getpid() ptrace$setopts(0x4200, r1, 0x3, 0x22) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x3c) ptrace$cont(0x18, r2, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) ioprio_set$pid(0x2, r3, 0x4) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300000a0000000000000000000002ce68f66aa4000100000000000000000000000000030000000000000002000000e0000001000000928d830c6f5eb2007f132835063aed40d9b04034ccd20e9ffd858f85af4809d998a8c4d663f59d8c9128186ed455a1099398a85fe6f8bf446e4bacc788aaa8de5aedfed208e3c7e56d3c782c5ee68992052d0e284c1d0000002000"], 0x50}}, 0x0) r5 = dup(r4) ioctl$EVIOCGBITSND(r5, 0x80404532, &(0x7f0000000000)=""/115) [ 854.655903] audit: type=1400 audit(1573846242.585:2573): avc: denied { create } for pid=1423 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:42 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:42 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0xc0c03, 0x0) ioctl$LOOP_SET_DIRECT_IO(r1, 0x4c08, 0x6) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r0) memfd_create(&(0x7f0000000040)='/dev/keychord\x00', 0x6) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000180)=""/211, &(0x7f0000000000)=0xd3) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 854.761522] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 854.839657] audit: type=1400 audit(1573846242.765:2574): avc: denied { write } for pid=1423 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 854.968228] audit: type=1400 audit(1573846242.895:2575): avc: denied { dyntransition } for pid=1433 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 855.033077] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:43 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = getpgid(r0) ioprio_set$pid(0x1, r1, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 855.160677] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 855.168194] audit: type=1400 audit(1573846243.085:2576): avc: denied { create } for pid=1434 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 19:30:43 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x24) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) lseek(r3, 0xffffffffffffffff, 0x2) ioctl$LOOP_CLR_FD(r0, 0x4c01) setxattr(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=@random={'osx.', '/\x00'}, &(0x7f0000000240)='/dev/full\x00', 0xa, 0x3) [ 855.381793] audit: type=1400 audit(1573846243.315:2577): avc: denied { read } for pid=1423 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 855.414773] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 855.428984] audit: type=1400 audit(1573846243.355:2578): avc: denied { create } for pid=1447 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 855.601802] audit: type=1400 audit(1573846243.535:2579): avc: denied { write } for pid=1447 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 855.605327] audit: type=1400 audit(1573846243.535:2580): avc: denied { create } for pid=1423 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 855.607734] audit: type=1400 audit(1573846243.535:2581): avc: denied { write } for pid=1423 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:43 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0xfffffffffffffcda) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000000000020000007f000001000000000000000002000100000000000000000000000000030000000000000002000000e00000030000000000000000"], 0x50}}, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) r2 = socket$key(0xf, 0x3, 0x2) r3 = syz_open_procfs(r1, &(0x7f0000000380)='attr/current\x00') preadv(r3, &(0x7f0000000880)=[{&(0x7f00000003c0)=""/157, 0x9d}, {&(0x7f0000000480)=""/187, 0xbb}, {&(0x7f0000000540)=""/173, 0xad}, {&(0x7f0000000600)=""/157, 0x9d}, {&(0x7f00000006c0)=""/131, 0x83}, {&(0x7f0000000780)=""/62, 0x3e}, {&(0x7f00000007c0)=""/163, 0xa3}], 0x7, 0x80000001) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') r8 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_stats\x00', 0x0, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x184000) sendmsg$NBD_CMD_RECONFIGURE(r6, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x330059d4d67605ef}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x78, r7, 0x8, 0x70bd29, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x2}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x1f}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x144}, @NBD_ATTR_SOCKETS={0x14, 0x7, [{0x8, 0x1, r8}, {0x8, 0x1, r9}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x4044040}, 0x4000015) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r10, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) getsockopt$SO_BINDTODEVICE(r10, 0x1, 0x19, &(0x7f0000000100), 0x10) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)=0x0) ioprio_set$pid(0x2, r11, 0x8) [ 855.880550] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 855.911986] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:43 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, 0x0, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f00000000c0)='sel\x00\x00\x00\x00\x00', 0x7) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:44 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/\x15uv/k\a\x00ord\x00', 0x140, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r2, 0x4c09, 0x200) [ 856.270631] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:44 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) capset(&(0x7f00000fc000)={0x20080522}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TIOCGPGRP(r4, 0x540f, &(0x7f0000000000)) read(r1, &(0x7f0000000180)=""/222, 0xde) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$net_dm(&(0x7f0000000040)='NET_DM\x00') fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 856.411961] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:44 executing program 0: init_module(&(0x7f0000000000)='+posix_acl_accesssystemnodevwlan1vmnet0-*posix_acl_accesswlan0*posix_acl_access($)\x00', 0x53, &(0x7f0000000080)='trusted-\\!)ppp0\xbfvmnet1*cpusetppp0+,eth0user\x00') r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f0000000140)={'bridge_slave_0\x00', {0x2, 0x4e20, @local}}) write$FUSE_STATFS(r2, &(0x7f00000000c0)={0x60, 0x0, 0x2, {{0xe8, 0x200, 0x1, 0xb3, 0x1, 0x7, 0x5, 0x3}}}, 0x60) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 856.571154] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 856.594490] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:44 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x10da00) r1 = memfd_create(&(0x7f0000000280)='BL\xfd\xff\x85\x8b\xa8M7\xb8A\xe3\xc0\xf7\xb6\xe7\x93m\\aA\xed\x8b\xccj\x80\x06\xcc\xe5^o\xd3\x88\xe5fE$\xbc\xdd}bl\xea\x01\f\xda\r\xf3\xfd\t\xea3\x826\xbd\x11\xce\x1d\x12\xd3\xff=d\xc5\xb7\xecn\xceV\xce\xfc\xfc\x80\x12A\xfe\x0f&\x93\xcaT\xe4U\xa4\xe5^\x9f\x88\xa8\x17\vt\xbb}Wa\x13\xe8h7]6V\x06F\x92\xb3\x1bJ\x9e\x9bBl\xe3-)A\xb3\xd5\xd5&\xe1E\x00sk\xad\x99\x1c\xd2b\x96l\xaf.\x98\xeeT\x8c\xa3H\xfc\x1b<\xc50xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, 0x0, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:44 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fcntl$setstatus(r1, 0x4, 0x4000) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 857.051002] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:45 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) socket$packet(0x11, 0x2, 0x300) r3 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r2) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x20000368, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) sendfile(r4, r3, &(0x7f0000000080)=0x80, 0x1) 19:30:45 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r3 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r1, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r1, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3be) setsockopt$sock_int(r1, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYRESDEC=r2, @ANYRES64, @ANYRESHEX=r4], 0xffffffffffffffcc) r5 = getgid() chown(&(0x7f0000000000)='./file0\x00', r4, r5) ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 857.341890] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 857.419269] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 857.590489] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:45 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x400, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) pipe(&(0x7f0000000340)) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000400)={0x2, 0x1, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_sa={0x0, 0x1, 0x4d2, 0x4, 0xfe, 0x48, 0x4, 0x20000000}, @sadb_key={0x0, 0x0, 0x0, 0x0, "93958638909a65d05ee6de4254058b8fae8d79da"}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1d}}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}}]}, 0x80}}, 0x8105) dup2(0xffffffffffffffff, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_RD_TIME(r3, 0x80247009, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept$inet(r6, &(0x7f00000001c0), &(0x7f0000000200)=0x10) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r8 = fcntl$dupfd(r7, 0x0, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x25, &(0x7f0000000100)=0x5001, 0x4) 19:30:45 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x6, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:45 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, 0x0, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 857.901755] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 858.030508] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$RTC_WKALM_SET(r5, 0x4028700f, &(0x7f0000000040)={0x1, 0x1, {0x39, 0x38, 0x7, 0x1c, 0x1, 0x380000, 0x0, 0x1, 0x1}}) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 858.324092] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 858.482929] keychord: invalid keycode count 0 19:30:46 executing program 4: r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x15, 0x6, 0x1, "1210acfb5a1e7194aee66c94d8fc995d"}, 0x15, 0x2) ioctl$RTC_AIE_OFF(r0, 0x7002) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) mmap$binder(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x11, r0, 0x1) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r3, r2) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 858.575078] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 858.603279] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:46 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) capget(&(0x7f0000000040)={0x20080522, r0}, &(0x7f0000000080)={0xdefe, 0x806, 0x3fe, 0x4c, 0x82, 0x7}) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 858.894422] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:46 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x440) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r3, 0x0, r4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000140)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r2, 0x54a2) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f00000000c0)=0x19) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$NS_GET_PARENT(r5, 0xb702, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 859.037865] keychord: invalid keycode count 0 19:30:47 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_buf(r4, 0x0, 0x25, &(0x7f0000000000)="7314d58e5eb5c19a749cb0a4675614546fd806f976eed86bc2a06af9fb695e9ae207a6d02ff802d857f7b9bb2f7768778cadae87058708d085470d51a2a82d41c785090496325add478618dc3a8ea01b691ad800b1d41d594350a1a9f0fc9e70a0f5461537ee5586", 0x68) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:47 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140), 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:47 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000040)=0x1c) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x4e23, 0x7, @rand_addr="accd1dd682e1476d35106281df9161a6", 0x3}, 0x1c) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 859.225911] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:47 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x2182, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in6=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@initdev}}, &(0x7f0000000200)=0xe8) r2 = creat(0x0, 0x0) r3 = getegid() r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) tgkill(0xffffffffffffffff, r4, 0x16) ioctl$TUNSETGROUP(r2, 0x400454ce, r3) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000001800)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x1}, 0x0, 0x0, r3, 0xfffffffffffffffd, 0x10003, 0x9, 0x9, 0x800, 0x4, 0x0, 0x0, 0x3, 0x1f, 0x4, 0x0, 0x4eb, 0x80000001}}, 0xa0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r5, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r6 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r6, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r6, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r8 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r6, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r6, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3be) setsockopt$sock_int(r6, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r6, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r5, @ANYRESDEC=0x0, @ANYRESDEC=r7, @ANYRES64, @ANYRESHEX=r9], 0xffffffffffffffcc) mount$fuseblk(&(0x7f0000000000)='/dev/loop0\x00', &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='fuseblk\x00', 0x2230, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=r1, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',allow_other,blksize=0x0000000000000400,allow_other,default_permissions,allow_other,euid>', @ANYRESDEC=r9, @ANYBLOB=',smackfshat=#posix[acl_access,hash,\x00']) [ 859.481020] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 859.631357] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:47 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/\x00\x00\x00\x00keych\xc9\x00', 0xa02, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 859.711599] audit_printk_skb: 96 callbacks suppressed [ 859.758391] audit: type=1400 audit(1573846247.675:2615): avc: denied { dyntransition } for pid=1582 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 859.781035] audit: type=1400 audit(1573846247.645:2614): avc: denied { create } for pid=1585 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 859.801479] audit: type=1400 audit(1573846247.715:2616): avc: denied { write } for pid=1585 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 859.990821] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 860.014863] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 860.042362] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:48 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0xefcff60d47d4423, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x20000, 0x0) write$eventfd(r2, &(0x7f0000000040)=0x296, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:48 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/e\xc4\x91nt#\x00', 0x7, 0x48040) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGID(0xffffffffffffffff, 0x80084502, &(0x7f00000001c0)=""/253) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000300)={0x0, @adiantum}) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="44008000", @ANYRES16=0x0, @ANYBLOB="00012abd7000fedbdf25030000000c00040004000000000000000c00040004000000000000000c00020000000000000000000c0006000000000000000000"], 0x44}, 0x1, 0x0, 0x0, 0x24}, 0x13a6ee1784d278af) write$9p(r0, &(0x7f0000000040)="d947135949671ed0da73968cd8038d80f9cd2a29854547fe30341f1a659a7a5df79ea421c3", 0x25) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCSREP(r6, 0x40084503, &(0x7f00000002c0)=[0xe50, 0x25d7]) [ 860.181591] audit: type=1400 audit(1573846248.115:2617): avc: denied { create } for pid=1608 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 860.211826] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 860.248074] audit: type=1400 audit(1573846248.175:2618): avc: denied { write } for pid=1608 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 860.300517] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:48 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140), 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 860.381486] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 860.433205] audit: type=1400 audit(1573846248.365:2619): avc: denied { dyntransition } for pid=1582 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 19:30:48 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) r2 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xe0000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = socket(0x100000000011, 0x2, 0x0) bind(r4, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r3, &(0x7f0000001080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f00000062c0)={0x11, 0x0, 0x0}, &(0x7f0000006300)=0x14) sendmmsg$inet(r2, &(0x7f00000063c0)=[{{&(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10, &(0x7f00000014c0)=[{&(0x7f0000000180)="8d717ad79f0c5c167e1392201450b532bb740a61a50898461228c9aedbba5c88c85fc32c9be971f682e4b29b6063bc6fa8ea94632824ae9370dee3517f252a447511b91352e43d64de050467a8d82ee619a74dce90f8de10b228bfa2bbefb3c89ec9edc73c6efc69f1320b099203e7056ba33f32d2cb6b9984f360d318173a42250fa0a17c7781f89d347d84b818a0e628a0da4e8458d00e9048fcf4bca45337fcf2f4f1384ea90be3730284442b0ebcbe79be93cf47b11b7caecdb83fa31cf5586f608f610e7ddd0d9724f1632b5527be130b0fe5cef37165b8f31d", 0xdc}, {&(0x7f0000000100)}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="483b66065834f501899acf97624047dec9ec50bf184cddf596bac166a209fa1cb073f99500d065373657f8d1fca017ce6ee6b1f95cf2415c404ed2544233ec0f2fce8aa76f519309930bd9731a6c348dc98229f7a071f903ad1f8a0ac58d6d70dc17c99b46525b83dba858cfa04971b8c6a7d21fcc685caf874cb444899278a8f394ae83a87ea805c9973de5676028cc1d6498f428ad166355420ac4073a51d51be5b4dee7cc919276979eac6d51acdf37872c99290571d52893907de446fddfbcd84abacf2ec6df6e6e7e9b81ff69bf82b381ba54d39e1aca25014f59c73caa53a478977a", 0xe5}, {&(0x7f0000001380)="1653d6418d8fd5ba9d", 0x9}, {&(0x7f00000013c0)="5215b271a559ce94bb4518f808ef0f69900687a435586dc11cfd56c878830641a21d58d46c5b51063a567aa6230fbd3c83f7e5ad1139b419ef4ad8d7ed69ec4660e8833e93731bde1c46fae1c04718642ac89c0b22891c34feb60f49b435e423735c93b7948c570428e1b16bd9747bb6718d30caa38dd3c50c04d528ed88a82ff61bac86593dcaad6d757a6041df59cb3b66f8c2095d27e4de11dae6e96ad53d2a0f7b656c0af9f12286a354029d36e96201dd8a44af94ca24eaa16d9c0c1f5b22943e716854e04c88f4d448655216527ce89dad51835fb984caab33b3627b6f671b1c", 0xe3}], 0x6}}, {{0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000001540)="daa17d8aa6be9ca10915b9ec6e704a01d92403ebde055ba8387de26e69090eed9aa28cf0b1026a7daba60197d38b090c009b1051c029c7c04b355e39607929d1144cf19616756d8cf047cd464143106f794df417", 0x54}], 0x1, &(0x7f0000001600)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x81}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x6}}], 0x48}}, {{0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000001680)="42fb9e6bbf0f6b22972fde32f4e99b57", 0x10}, {&(0x7f00000016c0)="3c58685d1d516323b9456fc07b58293393034e82c78465f475ce0721859be61ea9ff5c53e3de520fc74e8443e946f3d8b6be7dc23911dbb26917cb20", 0x3c}, {&(0x7f0000001700)="11458fbd180f70457e145d56146cd62c95d65a5c048ba9cfb95a57925a7e8466a765ae7e181a19c0238096faad9bf03771e2bad99824f905c7e84bfc729ec761e624ed1020e51fcfbd992b6120f706157fcf6cb2045e58c3b175ab9bd7f40ab8cac6d2ec3aae14801ad65bbbccd12ab989da08", 0x73}, {&(0x7f0000001780)="3a9215b8d107ecbd735b0c90588e9fb9a4ddd4e279929197ff72516a480ca7ba6ccf959b0b4c1accf16cae31403a691c209ef5c48afc33ba750b9ace46d246540f38a34f9c83e3a50051642e7146b4a07a04f1fb2f4ab214db8b5cde59b03cc978a36a5e10bf16e38b1666b78be9fb9300397fe3bfa7de0eef872c7e91839ae657f9302b0e486604315f57027f5a88e5c22d10b11f2614d53f999784a12375ac9bc74aa6f50fc2ede152e306648a26a8197c94c65f2cba48062d959d815a057157e46e91f6105aef7a4a03ad48b39ba18221ea", 0xd3}], 0x4, &(0x7f00000018c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x18}}, {{&(0x7f0000001900)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000002c00)=[{&(0x7f0000001940)="0eed8ed5604c0973002913ec5a115da302f5cda3cb2f033123400b06c3a589a456994c9a827d3a9f1fefca73ab74163091d6a80d3653340e22a630ed0c522160a7db40df9ce4711e", 0x48}, {&(0x7f00000019c0)="09d978b74c8a89a704b1249fc0ab260e054bf17947ebe3c3ac5c9d1ff4f6c07a2beebd7c12dadb7e1bcc4497a4aaf101ca6b49f70a10bae67ace8a0c0afa416b2e1791b6c3483634a65cdc3b35c56ab84d53403904f5eb509b16ab59a9ffcfca1712ea7c2014a05f059abb7e99f07bd5ef", 0x71}, {&(0x7f0000001a40)="c610bf808f16b58a1a1715e6e654e651ab0e0df163cd80b2562e25d695fad43de3c467acbd1639f9a1e25200c12a0becad7d348a01711b2f99d01ae32fce4c78", 0x40}, {&(0x7f0000001a80)="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", 0x1000}, {&(0x7f0000002a80)="d8698fabcbb5b54384b3d830a1f690f61771d6d6c071f296e9c943", 0x1b}, {&(0x7f0000002ac0)="cb4dcdad59374b368246e316f48db19adc8e610230138d3891a04f47f737c777c80e863cb71afd620d08f5c1680ca5693a795962df757893b9a1", 0x3a}, {&(0x7f0000002b00)="13cedee9cee3cc9990b8372f1975a34cbbb79dce4c4ac1896f4cd732669be063fea01248312a51aa29ea6fff1f312defbbb38fa7170625983fcc8906188cd93c6ad5ce52e5421a30a7d8b76177ab0e199867e784bac1d46d1ec31098d93dace5669e5a2e60d92e7c260b4d7d3201dbe19096044245a3f8281257353910462860b43bbcdcfd16e27c645f13dda145", 0x8e}, {&(0x7f0000002bc0)="c969d2bfe5eb7ad5af0dd9455aa6632ce4241b9f", 0x14}], 0x8, &(0x7f0000002c80)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @local}}}, @ip_retopts={{0x14, 0x0, 0x7, {[@end]}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x8}}, @ip_retopts={{0xb8, 0x0, 0x7, {[@cipso={0x86, 0x38, 0xfff, [{0x6, 0x4, "a333"}, {0x1, 0xd, "c8d32ff1f27e603a78f37c"}, {0x7, 0xf, "f841b5f37fd3cf9abb019a4b42"}, {0x1, 0x9, "8b2d59edc4483a"}, {0x6, 0x9, "3aba0a6703dfe8"}]}, @ssrr={0x89, 0xb, 0x8, [@multicast1, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @cipso={0x86, 0x50, 0x3, [{0x7, 0x2}, {0x1, 0x8, "ce5389a3ac08"}, {0x0, 0x11, "1c3242b716a68fb4245089dc745a88"}, {0xa, 0x2}, {0x1, 0x6, "87e98a60"}, {0x5f05e3c758b1d1aa, 0xc, "64ee430b3e06148c3c80"}, {0x6, 0x11, "782d49b1a4583cffa5e20b6585ec73"}, {0x7, 0xa, "c89e3f04bfbeec4f"}]}, @ra={0x94, 0x6, 0x7ff}, @generic={0x94, 0xc, "1e19672c3aa5a973e3a6"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}], 0x138}}, {{0x0, 0x0, &(0x7f0000003100)=[{&(0x7f0000002dc0)="4f088d688d8366f47f2bc0567f9208c2ed55b057a78224ecaa9e092f153402d8887e6f7612b90ba8aa1fe26e15441b205f755f5ce2c34d4df10ef0389e2bf6325d45de2187377445c9dbf7a3a9a620d41d6ebd9672695c5a374f0d697ac9f3a600a3b48813d19fbd50f911c841c0f4243116af5e96a1063fdcb1ea7eb128b137a9c5bd55e0029d9eba03bc535d28664bc672b8111dae387de5ea7dd1fb60a7362020060ad60030ac5391a59017cc231be01a33dd08e2ba1bc86c931e5684a034", 0xc0}, {&(0x7f0000002e80)="9b122698097ce023dcc650ca794a6d2522256d50b8c38283511664c61ac7e746bd6c50eed01476d2e97916f87dd6c0b9bd94e38a2624a4bf0dff35a62eaf21171f2a41930ee06709e6ea058660ca3e53edabb141d475fdce8b2cba7f084f50aff4e976db", 0x64}, {&(0x7f0000002f00)="8745a32c090a616e75ea632aeff7348dae6b12495f881f3105fab4ab967d3fe38c5073171f73413035c409d5966d867ecf76777841dcd5b8b900e5e98264b000d5103af7e947dca975feb832076519fe4fa3178d1b856c099eab5022", 0x5c}, {&(0x7f0000002f80)="a0f924f74178bc4b7108f379b0fb26b31bc5838eae1b7f2b002cc379218e210782a4825364da9170b44a576e41", 0x2d}, {&(0x7f0000002fc0)="ad6993d10e2eb4f6a86483e29971", 0xe}, {&(0x7f0000003000)="65d4c1d1b77621d2d7b724b6d3a016c776fa4ca6d7e6ab8c243bc9b42274084c5ff7ab9f32ec9216f3bbcc12dc8f243044c1ccbd9de20837c3ddfc49aa13aacf0523fb4340e535c3ae53a0e76946dd843b6ec06232d0116f968fed50934d39fae94138a945623a469d7893287a9b69e6ab87b28c51387ffca46365d2f491b17facc7d33e8305329214ab47b746a469b3c15f1710d76e7bce99c34770c9169846d54e097f3a2e328610618309d52d02b92feb443cd071c64c1f88b8c4dbb184fc6d64e733ae7bfbcb66816e9e6fbf6e1dd89850ee74d60129928f2aeef5c402abbe6e", 0xe2}], 0x6, &(0x7f0000006340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @local, @rand_addr=0x1f}}}, @ip_retopts={{0x24, 0x0, 0x7, {[@timestamp={0x44, 0xc, 0x44, 0x0, 0xa, [{[@multicast1], 0x1eb}]}, @end, @generic={0x6, 0x4, "b9e0"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}], 0x78}}], 0x5, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f0000003180)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000003280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000003240)={&(0x7f00000031c0)={0x78, r7, 0x300, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x34, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x10}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0xfffffffd}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, [], 0x20}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x5e}]}]}, 0x78}, 0x1, 0x0, 0x0, 0x8020}, 0x40) 19:30:48 executing program 3: get_thread_area(&(0x7f0000000080)={0x7fff, 0x20001000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1}) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x32214e6ebfe83f78, r5, 0x1d17c000) ioctl$KDGETLED(r4, 0x4b31, &(0x7f00000000c0)) r6 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r6, r6, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r9, 0x6, 0x1d, &(0x7f0000000040)={0x0, 0x1, 0x2, 0x40, 0x81}, 0x14) r10 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r10, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) recvmmsg(r10, &(0x7f00000019c0)=[{{&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/69, 0x45}], 0x1, &(0x7f00000002c0)=""/28, 0x1c}}, {{&(0x7f0000000300)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001840)=[{&(0x7f0000000380)=""/193, 0xc1}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/108, 0x6c}, {&(0x7f0000001500)=""/78, 0x4e}, {&(0x7f0000001580)=""/227, 0xe3}, {&(0x7f0000001680)=""/212, 0xd4}, {&(0x7f0000001780)=""/142, 0x8e}], 0x7, &(0x7f00000018c0)=""/197, 0xc5}}], 0x2, 0x200, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000001a40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001a80)=0x14) setsockopt$packet_add_memb(r11, 0x107, 0x1, &(0x7f0000001ac0)={r12, 0x1, 0x6, @remote}, 0x10) [ 860.582064] audit: type=1400 audit(1573846248.515:2620): avc: denied { read } for pid=1608 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 860.701115] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:48 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$setopts(0x4200, r0, 0x7, 0x4) [ 860.832254] audit: type=1400 audit(1573846248.765:2621): avc: denied { create } for pid=1622 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:48 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x2, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) symlinkat(&(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000040)='./file0\x00') [ 860.995771] audit: type=1400 audit(1573846248.925:2622): avc: denied { write } for pid=1622 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 861.004502] audit: type=1400 audit(1573846248.925:2623): avc: denied { create } for pid=1608 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 861.009524] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 861.051911] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:49 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x501002, 0x100) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:49 executing program 0: write$P9_RLERROR(0xffffffffffffffff, &(0x7f0000000000)={0x12, 0x7, 0x1, {0x9, ',vmnet0({'}}, 0x12) ioprio_set$pid(0x1, 0x0, 0x0) clone(0xa12a4000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 861.430950] keychord: invalid keycode count 0 [ 861.436172] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:49 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140), 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:49 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) signalfd(0xffffffffffffffff, &(0x7f0000000040)={0x2}, 0x8) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 861.671792] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 861.679291] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 861.791070] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:49 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) read(r0, &(0x7f0000000000)=""/73, 0x49) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 862.111061] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:50 executing program 0: r0 = syz_open_pts(0xffffffffffffffff, 0x42001) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000100)={0xff, 0x2, 0xffffffff, 0x81, 0x4d, "33fd3a46fc025c6e39b18ee85eb3e466d10bff", 0x7, 0x878}) ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x7) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x400000, 0x0) setsockopt$packet_int(r2, 0x107, 0x9, &(0x7f00000000c0)=0x9a, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x4, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) ptrace$setsig(0x4203, r1, 0x1000, &(0x7f0000000000)={0x38, 0x0, 0x2}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GINFO(r5, 0xc0f85403, &(0x7f0000000180)={{0x2, 0x2, 0x81, 0x0, 0x560f}, 0x1f, 0x1, 'id1\x00', 'timer0\x00', 0x0, 0x21, 0x7, 0x1, 0x5}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000140)=0x37ab) [ 862.210825] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:50 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r1) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r5, r5, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 862.411848] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 862.419273] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 862.692029] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:50 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="00000000ffffffff0000000000000000020006000000000002000000d9baeada000000000000000002000100000000000000000000000000030000000000000002000000e00000010000000000000000"], 0x50}}, 0x0) fsetxattr$trusted_overlay_upper(r2, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xb7, 0x4, 0x5, "483a2a1abc7f5401e2d868114892a3a4", "6c14b334f8fac38dc8d3e7e1aa0660974a61ed0657b760acc11016c0998985c997d74383a1f76b727bf1d62d93a7d92bb8323a3b4ea0da928ab0b94571f7abb1148cc031674203f4e03ebf1e260b626bbe73a1742d2f8d2840bd42febffa34c69a0fef51b288f9a3761e6d9df1acad040ea93cac20961f648e14c5b4e1f6906c1a0ce4ad03f9cdd1861b3b8e96b355dc80ba2091e94c7a777410b1eda0b5e9ca0319"}, 0xb7, 0x1) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) write$P9_RCREATE(r0, &(0x7f0000000040)={0x18, 0x73, 0x1, {{0x20, 0x0, 0x8}, 0x8}}, 0x18) 19:30:50 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_ALM_READ(r2, 0x80247008, &(0x7f0000000000)) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 862.780608] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:50 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 863.080857] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000040)='/proc/thread-self/attr/current\x00') [ 863.341498] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:51 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4a0080, 0x0) ioctl$TIOCSBRK(r2, 0x5427) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 863.540791] keychord: Insufficient bytes present for keycount 18 [ 863.547074] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:51 executing program 0: prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)=ANY=[@ANYBLOB="e8000000", @ANYRES16=0x0, @ANYBLOB="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"], 0xe8}, 0x1, 0x0, 0x0, 0x20000090}, 0x4000) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) getpeername$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r3, 0x0, r4) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000340)={{{@in6, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000440)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@rand_addr="dc2213314dd39771d609c0daddffc20c", @in6=@dev={0xfe, 0x80, [], 0xf}, 0x4e23, 0x8000, 0x4e24, 0x0, 0x9, 0x50, 0x80, 0x6, r2, r5}, {0x4, 0x87, 0x4, 0x8, 0x5, 0x400, 0xfffffffffffffffd, 0x1bf}, {0x1, 0x1, 0x8, 0x7fffffff}, 0x401, 0x6e6bb9, 0x2, 0x1, 0x3, 0x1}, {{@in=@multicast2, 0x4d2, 0x33}, 0xa, @in=@local, 0x3504, 0x4, 0x0, 0x7f, 0xffff0001, 0x4, 0x5}}, 0xe8) getsockopt$IP_VS_SO_GET_SERVICE(r3, 0x0, 0x483, &(0x7f0000000580), &(0x7f0000000600)=0x68) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fcntl$dupfd(r9, 0x0, r0) r10 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$P9_RWSTAT(r10, &(0x7f0000000080)={0x7, 0x7f, 0x2}, 0x7) setfsgid(r6) [ 863.801101] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:51 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$sock_inet6_udp_SIOCOUTQ(r5, 0x5411, &(0x7f0000000040)) sendfile(r2, r2, 0x0, 0x27) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r5, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000fec000/0x11000)=nil, 0x11000}, &(0x7f0000000180)=0x10) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = fcntl$dupfd(r6, 0x80c, r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r8, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e23, 0x4, @loopback, 0x1000}, {0xa, 0x4e23, 0xe13a, @mcast2, 0x3d58}, 0x8, [0x2, 0x1000, 0x9097, 0x7b, 0x1, 0x9, 0x6, 0x9]}, 0x5c) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:30:51 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e21, 0x4, @remote, 0x1}, {0xa, 0x4e20, 0xf58c, @mcast1, 0x9}, 0x1, [0xffffffc0, 0x101, 0x8, 0xffff439a, 0x3, 0x1, 0xfff, 0x1ff]}, 0x5c) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300060a00000000000000000000000300069c59bf41575139af007f0000010000000000000000020001000000ff0000080000000000000000000000020000000400"/77], 0x50}}, 0x0) fremovexattr(r2, &(0x7f0000000000)=@known='system.posix_acl_access\x00') fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:51 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) sendmsg$inet6(r0, &(0x7f0000000480)={&(0x7f0000000200)={0xa, 0x4e22, 0x6, @dev={0xfe, 0x80, [], 0xd}, 0x9}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000540)="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", 0x1000}, {&(0x7f0000000240)="e46fda83667e8f51565986dcba9debf0fc5b09665ee0c6fac042ebdac9a2f7855e472cea5aa562ff2007ce7485caf31a2c5362ae", 0x34}, {&(0x7f0000000280)="25a204c6e2fa56bbad5d7ca2f6edc156fe8ad299ee95beefad843532957ee8252c8984602ee44cd0a51ae32b3f2c818d8022ed2b284a32bb4096bc4c90ab64260e575d0b268fe328f35f2b70c445821fcb4d20472702a782b09e", 0x5a}, {&(0x7f0000000340)="bdc1df218c1968fea704e6e2af84dd8ab16dcfd6f6f3f7ca57f30efe21b1a67f230f07495af98589f5f32f307488584b635d2d", 0x33}, {&(0x7f0000000380)="5f95cccf7bc85c5812f6a6b06a55e5bc05466b15cc20b15bc378c4d6c1414f342b33efe0527927b91c60a17843b9fee50a25684343c5b4b6f8f73ce28fdfd6", 0x3f}], 0x5, &(0x7f0000001540)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x9}}, @tclass={{0x14, 0x29, 0x43, 0x110d}}, @dstopts_2292={{0x88, 0x29, 0x4, {0x0, 0xd, [], [@hao={0xc9, 0x10, @local}, @enc_lim={0x4, 0x1, 0xfe}, @padn, @generic={0x55, 0x48, "03c197d1cc34bdeb601911ca9d031765c779b2947729688e295711965788742763dfbb21afe64320c18cfce5a929d61929d8b650eebd3d9e48e4fc5ae95b89d10963d56806ce89be"}, @ra={0x5, 0x2, 0xbc}, @enc_lim={0x4, 0x1, 0x3}, @ra]}}}], 0xd0}, 0x0) r2 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) splice(r1, 0x0, r2, 0x0, 0x30009, 0xf) syz_genetlink_get_family_id$net_dm(0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r4, &(0x7f0000000140)=0x2, 0x8) dup2(r4, r3) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) fcntl$getownex(r4, 0x10, &(0x7f0000001640)) socketpair$unix(0x1, 0x0, 0x0, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_genetlink_get_family_id$fou(&(0x7f0000000300)='fou\x00') sendmsg$FOU_CMD_ADD(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="00002dbd7000ffdbdf250100000014000700ff01000000000000000000000000ffffac1414bb08000600e000000108000600ac1e0001"], 0x4c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000) sendmsg$FOU_CMD_DEL(r7, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="200928080019003c00000008000a41ff210000"], 0x2c}, 0x1, 0x0, 0x0, 0x8010}, 0x800) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) fcntl$setstatus(r9, 0x4, 0x800) [ 863.873047] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:51 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 864.021302] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 864.113041] keychord: invalid keycode count 0 [ 864.221370] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 864.228807] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:52 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:52 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0xfffffffffffffffe, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x102, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket(0x100000000011, 0x2, 0x0) bind(r3, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r2, &(0x7f0000001080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) r5 = geteuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000040)={{{@in6=@dev={0xfe, 0x80, [], 0x17}, @in=@multicast1, 0x4e21, 0x8, 0x4e22, 0x4, 0xa, 0x0, 0x70, 0x1, r4, r5}, {0x10000, 0xf4, 0x5, 0x2, 0x100000001, 0x400, 0x10001, 0xffffffffffffffc0}, {0xffffffffffffff2f, 0x7, 0x0, 0x9}, 0xb751, 0x6e6bbd, 0x2, 0x0, 0x1, 0x1}, {{@in=@dev={0xac, 0x14, 0x14, 0x1d}, 0x4d5, 0x3c}, 0x2, @in=@local, 0x3505, 0x4, 0x1, 0x3, 0x6, 0x1, 0x3ff}}, 0xe8) ptrace$setopts(0x4200, r0, 0x81, 0x77fa80798a339501) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:52 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 864.681287] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 864.911712] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 864.919115] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:53 executing program 4: r0 = open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r1 = inotify_add_watch(0xffffffffffffffff, 0x0, 0x1) inotify_rm_watch(0xffffffffffffffff, r1) sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x900}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0xd4, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x6c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}]}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xdbeb}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x8880}, 0x1) inotify_rm_watch(0xffffffffffffffff, r1) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r3, r2) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:53 executing program 0: ioprio_set$pid(0x1, 0x0, 0x200000) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 865.358736] audit_printk_skb: 87 callbacks suppressed [ 865.409271] audit: type=1400 audit(1573846253.285:2653): avc: denied { create } for pid=1758 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:53 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = perf_event_open$cgroup(&(0x7f0000000000)={0x3, 0x70, 0x1, 0x73, 0x4, 0xcb, 0x0, 0x8, 0x2, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x442, 0x3}, 0x28f7f35e44d4988a, 0x0, 0x73df, 0x8, 0xd1d2, 0x2, 0x7}, r4, 0x2, r7, 0x4) ioctl$PERF_EVENT_IOC_ID(r8, 0x80082407, &(0x7f0000000100)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 865.492183] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 865.500577] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 865.549935] audit: type=1400 audit(1573846253.475:2654): avc: denied { create } for pid=1765 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 865.678370] audit: type=1400 audit(1573846253.605:2655): avc: denied { write } for pid=1758 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 865.740568] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 865.812042] audit: type=1400 audit(1573846253.745:2656): avc: denied { write } for pid=1765 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:53 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(0xffffffffffffffff, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 865.941856] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:53 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000040)=""/113, 0x71, 0x8000, 0x0, 0x0) 19:30:53 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) r2 = accept$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000080)=0x1c) listen(r2, 0x5) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TUNSETLINK(r5, 0x400454cd, 0x336) [ 866.073677] audit: type=1400 audit(1573846254.005:2657): avc: denied { create } for pid=1758 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:54 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x3d, 0x0) r1 = memfd_create(&(0x7f0000000180)='\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 866.204243] audit: type=1400 audit(1573846254.135:2658): avc: denied { read } for pid=1765 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 866.241690] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 866.431694] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 866.435556] audit: type=1400 audit(1573846254.365:2659): avc: denied { create } for pid=1765 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 866.437131] audit: type=1400 audit(1573846254.365:2660): avc: denied { write } for pid=1765 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 866.440687] audit: type=1400 audit(1573846254.365:2661): avc: denied { write } for pid=1765 comm="syz-executor.4" path="socket:[125574]" dev="sockfs" ino=125574 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:54 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$ION_IOC_ALLOC(0xffffffffffffffff, 0xc0184900, &(0x7f0000000000)={0xfff, 0x32, 0x1, 0xffffffffffffffff}) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x9, 0x91d, 0x6, 0x5, 0x0, 0x7}) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 866.442044] audit: type=1400 audit(1573846254.365:2662): avc: denied { write } for pid=1765 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:54 executing program 0: r0 = gettid() ioprio_set$pid(0x0, r0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:54 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:55 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) clone(0x1000000000011, &(0x7f0000003980), 0x0, 0x0, 0x0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r2, 0x0, r3) getsockopt$inet6_mreq(r2, 0x29, 0x14, &(0x7f0000000080)={@empty}, &(0x7f00000000c0)=0x14) waitid(0x0, 0x0, &(0x7f0000000000), 0x4, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r7, 0x10e, 0x1, &(0x7f0000000140)=0xd, 0x4) sendfile(r4, r4, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 867.301120] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 867.308584] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:55 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x490c00) ioctl$PPPIOCSCOMPRESS(r0, 0x4010744d) clone(0x200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:55 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socket$inet6_udplite(0xa, 0x2, 0x88) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 867.621534] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:55 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x180000) ioctl$EVIOCGBITSND(r2, 0x80404532, &(0x7f0000000180)=""/99) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 867.871381] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:55 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x5, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2, 0x1, 0x2}, @sadb_address={0x3, 0x17, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @multicast1}}]}, 0x50}}, 0x10) splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x30005, 0xf) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:30:55 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) waitid(0x2, r0, &(0x7f0000000040), 0xe075bcc752815c0b, 0x0) ioctl$RTC_VL_CLR(0xffffffffffffffff, 0x7014) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PPPIOCGIDLE(r3, 0x8010743f, &(0x7f00000000c0)) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 868.112108] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:56 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 868.272279] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) write$FUSE_IOCTL(r2, &(0x7f0000000040)={0x20, 0x0, 0x5, {0x2, 0xc, 0x6, 0x281}}, 0x20) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x80) r4 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) r5 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r6 = socket$key(0xf, 0x3, 0x2) getdents(r2, &(0x7f0000000180)=""/108, 0x6c) sendmsg$key(r6, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000000000020000007f00000100000000000000000200010000000000000000000000000003000000000000e000000100"/80], 0x50}}, 0x0) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BINDER_SET_CONTEXT_MGR(r9, 0x40046207, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0xa, 0x2010, r6, 0xe4d39000) sendfile(r5, r5, 0x0, 0x1000000003) ioctl$LOOP_CLR_FD(r3, 0x4c01) [ 868.401627] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 868.413600] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:56 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000000000020000007f00000100e8ff000000000002000100000000000000000000000000030000000000000022000000e00000010000000000000000"], 0x8f}}, 0x0) r1 = dup3(0xffffffffffffffff, r0, 0x40000) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='fuse\x00', 0x20000, &(0x7f0000000180)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x1a000}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x2800}}], [{@seclabel='seclabel'}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/keychord\x00'}}]}}) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r5 = dup2(r2, r4) ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$P9_RLERROR(r6, &(0x7f0000000280)={0x9, 0x7, 0x1}, 0x9) getitimer(0x3, &(0x7f0000000100)) dup2(r3, r2) r7 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r7, 0xc0406618, &(0x7f00000002c0)={{0x2, 0x0, @reserved="cff7242c8c707b235e0676c243ef67afb14b0acaaa822cff71698525be42cab6"}}) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 868.800523] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 868.809791] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:56 executing program 0: ioprio_set$pid(0x3, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) arch_prctl$ARCH_SET_CPUID(0x1012, 0x0) 19:30:56 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0xfffffffffffffffc, 0x200000) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) clock_nanosleep(0x7, 0x0, &(0x7f0000000180), &(0x7f00000001c0)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) pipe(&(0x7f0000001d80)={0xffffffffffffffff}) getsockopt$EBT_SO_GET_ENTRIES(r4, 0x0, 0x81, &(0x7f0000001ec0)={'nat\x00', 0x0, 0x3, 0xa5, [], 0x1, &(0x7f0000001dc0)=[{}], &(0x7f0000001e00)=""/165}, &(0x7f0000001f40)=0x78) r5 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = dup2(r5, 0xffffffffffffffff) ioctl$TUNSETNOCSUM(r6, 0x400454c8, 0x0) r7 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xcd6b6327fefaed3d}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x470, 0x10, 0x400, 0x70bd26, 0x25dfdbfb, {0xe}, [@nested={0xd4, 0x6, [@generic="58bfed13ef34a876a0279b2dcb8ca578c77eb5622e43b03223f76eefb2aeefb5cdaad4b952b3c3a64d57e8a857fe037a37c189c920dc8a9c2b22d443ad4aa9cc2e5dea62129a0a92b7ce1e77d9f81b8007a4aeb452cf2b371deef710e7921d510000000000000fffc2c030a159", @typed={0x8, 0x7f, @u32=0x7fff}, @generic="fc32f20e693a96ba792c5ce00b36b08c16da22e0aae3c3eb98492e5561dd4c91fc87fcb684f79d6b26e2c5e8045d72d64d5449861d786b38c47101d1db3a9b96606d2a865156087e202054e5f7692b", @generic="ffaf9a60b7a0410d65269183"]}, @typed={0x8, 0x32, @ipv4=@multicast1}, @typed={0x4, 0x6}, @typed={0xc, 0x76, @u64=0x9}, @nested={0xd0, 0x4, [@typed={0xc, 0x3b, @u64=0x6f}, @generic="114b6c16d85a95cfed203a171268fd93601797e8d81688e32905a8efa5faef08383322efcaca369b663a5b3fcd67d05d10e7ce880d878aef875f742862cb104d6148455e0311d9dec49431223013b92d24438a26a261fbd2eba3e4079e48270f34755fc2f5f1cfd2ede3e87751ca35645309a2e96415cb4c22b779c140af7559358313329dbd71a10c913d734ef15a512afc3daa4b93df52b1e0812a49d048eb352259f69b81106e3545806ea1786dd2c71411df049ffa7368cd700b1888f6"]}, @nested={0x1c0, 0x82, [@generic="59ea84b6e82d12aca5cdada24e2b727dfd0797b17188a7430a37a4e56a0d4dc96845d0cfee3108736e504ebdae648a4005938d1284160fa8655a3d192a645408512ff08bf86d92ca5138e5cf82902696e0bdc7f45bba75e1b5cbea9a0b7fb29870f7f7f8eb500a68e413fb8db2bbad78917336b7a4f4993ab4c30b7be04add9b4ea8d0d96c38e88e14d2047cd9579426c274d26336b19c14f63915582fa5a6a4f698cb44957ef7ddcd5dc57028915bb603c402edf5573997b7ed933144293785c914cbd2674477ac5d0c4d1ec4164fc0e30c9f860f48", @generic="d0c79c454e0ea4875a166393091bd77b368abb0d8484380550a013a6145b5b3860dc369108dda3632a8444e5d7570dfed63b34442242c5994583cee43d8feff936c9359e05af691b682d79765a8d05b6e084f92ef02bc535a00942d1bf0c430e04b1bce834b6e04984b3ae666a0d79d303944a18daffb4c0f270fdf11eff15712f5476bdaa19eea81d133cba4cb85e8353dac38f359b2e64bf70b2c711d1b3f805c80e173c8477bd56b84d7526ceb79ebbe4c070d97a7340c02881997d8354a4ec2c994bc677ce3dd5ddcff697c833fcce4f9d3c58ab4e939b92ba4dceb11acc9728fc0c"]}, @nested={0xc8, 0x71, [@generic="741e21cb88abad2cdfdc1fc88dbd0a601d26fd88aa81e2132059b4338cd3628631c36f30f1f3ab25a23d72c77e7a997027598dfa676cb0561ad677fa1efd459d76a783b3c05764a4dafa9e1a5a6a3f9c94add550b47f39e836dd1f0f39cc9a44caa9874fe6319364387564ac7ce6fc516195676436ab34d619771498d41d2213a4ab2f510126ec610ca9fa3eb7589e2d25d7e2fbb0599e45a8582b03cba4e31fd2a3a12f2716f53fcf84c46290c395273844d0dcff0473358e5fe4d084400447c27673a1"]}, @nested={0x18, 0x38, [@generic="dbd40e25c5e2cca3304b21ee2b47d48d89bc"]}]}, 0x470}, 0x1, 0x0, 0x0, 0x2000}, 0x2004040c) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000740)={0x2, 0x400000000000003, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_x_sa2={0x2, 0x13, 0x3, 0x0, 0x0, 0x70bd26, 0x3503}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x4e22, 0xa7f0, @ipv4={[], [], @rand_addr=0x7}, 0x6}}]}, 0x58}}, 0x0) r9 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r9, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) splice(r8, &(0x7f00000006c0)=0x7fffffff, r9, &(0x7f0000000700)=0x7a70f552, 0x8001, 0xf) ioctl$LOOP_CHANGE_FD(r5, 0x4c00, r1) r10 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r10, r10, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 868.970561] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:57 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) read$FUSE(r4, &(0x7f0000001180), 0x1000) write$eventfd(r1, &(0x7f0000000000)=0x20100100000001, 0x8) r5 = dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/access\x00', 0x2, 0x0) ioctl$RTC_PIE_OFF(r5, 0x7006) [ 869.151415] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:57 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) ioprio_set$pid(0x1, r0, 0x8) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r6 = fcntl$dupfd(r4, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PPPIOCSACTIVE(r6, 0x40107446, &(0x7f00000002c0)={0x4, &(0x7f0000000280)=[{0x6, 0x7, 0x4}, {0x2, 0x6, 0xff, 0xffff8001}, {0x200, 0x7, 0x0, 0x9}, {0x3, 0x38, 0xa8, 0x8001}]}) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000140), 0x20000000, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r7 = getpid() write$P9_RGETLOCK(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="1e0000003702000101020080000000000400000000000000", @ANYRES32=r7, @ANYBLOB='\x00\x00'], 0x1e) time(&(0x7f0000000000)) prctl$PR_SET_DUMPABLE(0x4, 0x0) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f00000000c0)='y\x00', 0x2, 0x2) 19:30:57 executing program 4: open(0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) write$binfmt_aout(r0, &(0x7f0000000700)=ANY=[@ANYBLOB="da02403094030000e8030000ffff00002c0000000200000000000000000000000763d5a17e96492a2876c2170000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac35eef9f6ed1702227af01e289de0e9e7e38810040375cec68d5792e80a00d67c5c8d3e1f408747995e"], 0x52c) socketpair$unix(0x1, 0x5, 0x0, 0x0) [ 869.540793] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 869.548415] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:57 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xd0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r2) r3 = memfd_create(&(0x7f0000000140)='s\x9f\x04R\xf4\xf1\xe5\x8d\x13\xa32\xc3\x1f\xc0\xe3\xf1>\xfe?\xfb\xea\x96\x04\xc3?\\\xbb9U,\x13\xd1\xd0[\x85\x9e\xea_:\xad`\x1c\xbc:e\xf2\xf3\xcf\xef\xba\x84Ky0\x90]K\x96\xa93f\xa7\xa2\x90\xd3\xf2\x7f\xf7\x1cN\xbax}X\xce\xa9W\xb1G\xf3\x9f\xf2\xb0\xc7M\xaf\x90W\xfbO}\xf7\x05\xd5\x06\'W\xcc\xd8\xd3M\xf0\xe5f\x7f\x93\xb1\xbf\xca\x97\xb3\v\x1b\x19\x1a\xb9\x94\xec\xdd^\'\x0f\xad\x1b\xc4\x86\xf4\x15_\xbd\xb8cF%\x0e)\xfc\xbe\x94\x95\xd0b\xae\xbf~\xce\x99\xd7\xdc\xf8\x93\x14\x877\x16\xe6eG\xf8@\x86\x82\xbee\x9fl}8\x18\x19\xf2ou\xde\xdd\xb9\xb6%s\xd1\'\xcb\xab^\x81\x00\x00\x00\x00\x00', 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r3) prctl$PR_SVE_GET_VL(0x33, 0x6b9b) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 869.630662] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:57 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, 0x0, 0x0) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 869.750974] keychord: Insufficient bytes present for keycount 2 [ 869.982078] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:58 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/relabel\x00', 0x2, 0x0) fcntl$setlease(r2, 0x400, 0x2) dup2(r1, r0) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) r4 = syz_open_procfs(r3, &(0x7f0000000000)='cgroup\x00') getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000080)=0x1e) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 870.291770] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:58 executing program 0: ioprio_set$pid(0x2, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:58 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = getpgid(0x0) ptrace$setregset(0x4205, r1, 0x200, &(0x7f0000000040)={&(0x7f0000000240)="a843c6728bd69ffed2185f692a8a697e32eccdd993e80111ff6131360231ba444e9f93dbbb23f37e6a51a9a66e9fc7afa53003c4c2dbdd7fe5b943769530498515111a2f5c42aef9fa35087a167c42f7bda49b7123cff27698f8ab48a497ce6bd681ea635428836388da5da33396a6bc747fe80bb7dc7b494068986407b9e80fd5ea5ad09787cac350d56d99599739ed09c569d59ccaf48b6a6122405d19fb95d39e0e82d32f6ba4abf1285664fd1146225e402c4297f715e8b8146177bbaf458d962ef2068b8d7a3647e4b73a15e49c0759e96da5ad093030666a25a6b150f9253f3acdf6e68a4e2be28d041609407a254a29ea44", 0xf5}) r2 = memfd_create(&(0x7f0000000100)='+\x00', 0x7) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/context\x00', 0x2, 0x0) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f0000000340)) r4 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r4, r4, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000000c0)) 19:30:58 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x7, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x4, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) setsockopt$sock_int(r2, 0x1, 0x0, &(0x7f0000000000)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000040), 0x4) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 870.400644] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 870.620740] audit_printk_skb: 84 callbacks suppressed [ 870.626081] audit: type=1400 audit(1573846258.555:2691): avc: denied { read } for pid=1914 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 870.661253] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 870.673121] audit: type=1400 audit(1573846258.605:2692): avc: denied { create } for pid=1899 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:58 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) [ 870.781139] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:58 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140), 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:30:58 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x8f03c41903fd39ea, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:30:58 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000180)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000005c0000005a995edfd2c098f90ee3750f8565a9a39b7abbd52987a65a35300d145d176900908e10778f1fb41d166bbd0f84b5a681387c1102716a01861a892cd92c2767433506021193e85c3fd4ef79a4dd6e7a90f7091f63507afe159e73450e5ea68a892db9f32acf8e3bb0cbb8c18a656ff21af3efbb30ac6b0ab7696e848c5d5dc05f58df93dc24be018280a1c76708668c65b9dac30dd8aa778e49bd26d12c420157ef5a218210fcfd65f9bb3220673c018c167464c4d892f8e0c527800eaa1efebf1589b9755cef20aa6ae7740f984c4d24f43842512b28f9c1a034245af857d2e31ec10fbbffa1da97177c163a1617264194ea8c1607b6980403d66d9179a187e766339d301a1377853c3ece0880"], &(0x7f0000000080)=0x80) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 870.951185] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) r3 = socket$key(0xf, 0x3, 0x2) r4 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$EVIOCSABS3F(r4, 0x401845ff, &(0x7f0000000180)={0x8000, 0x6, 0x80000000, 0x40, 0x1, 0x9}) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r3) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 871.232653] audit: type=1400 audit(1573846259.165:2693): avc: denied { create } for pid=1944 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 871.300843] audit: type=1400 audit(1573846259.235:2694): avc: denied { create } for pid=1942 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 871.341989] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 871.441601] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 871.452430] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 871.512051] audit: type=1400 audit(1573846259.445:2695): avc: denied { write } for pid=1944 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 871.543818] audit: type=1400 audit(1573846259.475:2696): avc: denied { write } for pid=1942 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 871.630629] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 871.639094] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 871.791724] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:30:59 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r2 = dup3(r0, r1, 0x100000) r3 = socket(0x1, 0x3, 0x0) ioctl$sock_ifreq(r3, 0x8932, &(0x7f0000000100)={'syz_tun\x00', @ifru_settings={0x1, 0x0, @fr_pvc=0x0}}) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r3, &(0x7f0000000480)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000440)={&(0x7f0000000780)={0xdc, r4, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1f}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x8, @local, 0x5}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb9a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8}]}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6825}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}]}]}, 0xdc}, 0x1, 0x0, 0x0, 0x40004110}, 0x20008010) sendmsg$TIPC_NL_BEARER_SET(r2, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20840000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x124, r4, 0x5cac1e0731e35d0d, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffff7f}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xaa3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_LINK={0xa4, 0x4, [@TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9d5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x8}]}]}, 0x124}, 0x1, 0x0, 0x0, 0x40}, 0x2008400) r5 = socket$key(0xf, 0x3, 0x2) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000000)) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r8 = fcntl$dupfd(r6, 0x0, r7) r9 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f00000000c0), &(0x7f0000000100)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) accept$inet(r8, &(0x7f0000000040)={0x2, 0x0, @loopback}, &(0x7f0000000080)=0x10) [ 871.947498] audit: type=1400 audit(1573846259.875:2697): avc: denied { read } for pid=1944 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:30:59 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000002300)='/selinux/avc/cache_stats\x00', 0x0, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r4, 0x0, 0x48f, &(0x7f0000002340)={0x2fe28b286e3bbbfc, @rand_addr=0x3, 0x4e24, 0x1, 'ovf\x00', 0x10, 0x3f, 0x7a}, 0x2c) sendmmsg(r2, &(0x7f0000002240)=[{{&(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x4, 0x0, 0x1, 0x0, {0xa, 0x4e20, 0x0, @remote, 0x7}}}, 0x80, &(0x7f0000001300)=[{&(0x7f0000000180)="cfdc1f04356cd138f50715a8d8f076da37dfc484a031306b9d14505d75c3b82ec669a810e07f2293d4100c82ac6c3997a5e001a2635ed1aa206a3730574361b50664e4574a516dc8a474fb866b98c34e4726b2775f65ea64ba4ec34e0a51db09bbd7074d9c8e0b93a8a24c1a83b3d623334f5bda74581e93a0e7791fb982b8256e3e1bc3cd27bbc53b6d88e8da2d819c3f69ab2afabb6c6019beb98e46febccba786e5996bae59772e3614c169be16ed30d11080aa016414fc3fcdf720c78573c2c16f6e09dc7795ecdf26dcfce4c26eea08a7a95a1d5d40b296a96e59a77dd5736051ad7045b35b7ae1136ca974381c042b969ad7d8132be3f133f4c4a34bfa752dde7133a0d0d816ae26c0db02aae7cdd24c65d01467bf83ac6324d4f37f9a8735f4555110e71b5014a91154682f7a93eb9f8b38065e4cf05af5a76281f60429753c8794f9a04e55e9e2419f76a140dfe65ea68b53cddf3b3314acfc02dfb62eae2789e1a05d14acb049afa70506c48ccfb1806eb4f17dad754067338f215153d178dd76dfe36371296cf9ead07e56c12d0ad6e6c90e33e68980f7f0bd6a12a32f03bb9932d52b5e0c6426298069d3d6d4765427db3e7fedbd69b6b09b583a3758ad04a3571ac94c7a4392507574e0e70ebca9341c353587b203f8b7e9ea5549532972a565e00a18ef9b5242ef55b7ceb017ddadfc7a9cd73ca89bbc751c3ee548b13237d2e3282ee597f3b11eaf434dd84303d2e4630cd58a1ab07447e19bc8575a8a60b570eff1ff6b27fde36ef6dd9f54317454e4e5b239634a8cd656e6ce5a7e137ae1d7a606a23f937f98cac481d5ba8e7fbed7b037cad4992ff34c701cffeb93135d8bc3e750dced9c72dd1796f333c8bb110cfa29fc0dbf736033cd2e35df91ff9148c68eb9f7ecd46d26c7325574dc3b488904cea859c43c4c8685baa58455285491b3a8e110eb90b40cb23856a762208497907a225b6f78058925abde2113e3326fe6223ad7ec6a87be8c8a9233215dc1ebbab1c599fd14089ae31e03d289d1efe170a2109bde25388529bff47d242d11c6fac9d27de251febbfc3eb449838b0774a8d2ecfd115ad3634d0ff6c95c349ce6df68fbddb7ba37927204bd464cdf4a7950ebfc67179536b6cca36f01b5a8bef623869b6dc4ce7ab8e1562f4dc57728af5ec6c6a50dbfc5f35a1165f555ec8d0dbb973a960336ca933ff26047ee2e4f97ed5e5e8baf9bdada19436964bca77b1d0f6f4a74b0e01c0d644c8a4885d8a32d5c0fd30d6227a3dbc7b8cdc117985ddd392083615a6eca71503d6edd08d5dc96dfedb0eaf83bde8c666c184c10a8f533cde6bc8e0dee706a3b6160df89027e994340c3d103747ec916f45c5e90c8d5b01c5c62a10b7c8cd8125d0370a90141255ce31dbf84ce935f5b1028d9b952e023c8fa22088c9c904b2859c2b01756033d24072ef8a762bbd292d0b408715eca8762663ca2aeacb20e9ba5bcfb6db34e66335aab8e2d2c2f177981c0667b68157f0102eff41e007f8b0020cde1a61a88c80e1221eeafb4233287926e0cfbc2f1c5879a6e616283dc03d9a3c3982d28cfb63ba02e2e4822e60de118356319d3925b6c78790efff77d75a3719ef3c472186a0f0edb7171934f12ea04a1bbbdd9bc88df96731d9a397e89aa2237e13cf97004e4dc6016e0f3388ff225f8fc5cc7ad8cceaac24a19ec874fa86557ac5f6e34b81b1dc3a92a7fcb87002e95299b9b0e78c2404e834464a84cf74bd4ee5e22119b3ed5534f7578a2530a67d1dfacf18b45f4053ce2fcd054181a01957e010de494ccaa0a0e9940a943847f0024d19bee93b747639d71acece07e70f2c8eca4cdb1a99d3d290c356b3e982dd9de592f9e0818f9f4a8a336c612367d5349386b4a8521129dcd195785a84af59df10fb7e08392e090033fae6f20703cdcf19803369a98739880bb35e62912cf6c1fccca0eaf1e377de5e87fb558129e5e8243634de24768df90a436ae4a191272539b82683cf1aa7c9f40ec4c30691a526632e5891a4ea53c81dd5f2dd89b0f178dcec9072b9c1f73644dab867881536ce62aac5e9aea2c3571e6f3c6a19211c91453da8b44286592748a478d2fd38b771a023ec86b88954db0abe73f6f05c50cec87bc004abbc137aebd40e9f3907845dab488886a33a5ef351dda5cba84334da526f641b27a883817fc09abe4a4e45f8a274f3431d37b186611f07603d4dbcf8291c154e90d0b3e48a6980e7d9c9b9e82e09a55fbeb35b87876369522225f560c9c198f127f441a2a6aaaa2ae010da5b54812f5058ac0d93866fa8001f125444d4f638a9900d516472d6e4381cfcfcbdad31a30420acac5ab1218972ed9d205daea58e34ee5365dfe9023c1ae6ae6f4186d244b764e13992b53641ed4c3d7274d2924aa11b5bd079e04b962067b5fa844b59e8042ccca4dbb8633b86790b6b786babd08ca13643b356963696a1230058d866c459a5203d70408d95a7834754634f3bec6a801fcb3e8ea2971e9913ca648e6f7c0e4271cd817a1f6cfdc198874a1a161155615f5ef0822a52a051fdcdfac145baf5ccf3e326397c791ac13390efa2536c8f77121fe5dcaba3c6e4ea8c92da5a25c92bf615ab4c149ec18e56e7a4a746bdf49002817b549cb4eb023b8dd571981ad5bbc8a52b46a13ed262d0231765036a5ac4ced5d4ae553dafe71e4ed31f21c1533363efe237d99addcafa8ae24097223483bfe7268e1d82acdac2d1c3d4535de04618304765616cc0ca308d704d04ea7dd57df16d9dac3858f10a0c8c05060bf42854e3dc3d3ebe275d6e87f740ec44d9f794ab0363b3b8ccb05ef39fbea079f4f33f2f4df6b17ad827d8484a110eea83645cea318f1540ac49286db791a7dd9154e3d7d904817020df9a9ca7512ed235c049a8026c3286e5030866f9f4efffc00834b67d5fce946bc17e9f033879f9fd7c262b2bdaa24f764378b541039eea1508dbfd2aa450a2a41335b9550e9a5ec1854f61018f4ab3c7d902a482fd3fdd613eef05e3590a586d3e3715d044e5a3328e4f5a24ebd16f8910b8c8d58c58567792865546f3a5c56afd941677ff24606223e7587a4bc8b164a774d2b8ebe5e6e0f7ef477e99f77fb4d2c0239b857d4475e497cad6e21f8c4ce1948bd1f16c553329e31187dd35ac477b455ee1823daf9c0179c956b31176cb245a1c2528f3f0658693ef5c24ed26a669d0ac92354cd56858690f185032dc61769719cf1c55c65f749defaf77d1029ce9cbad3049dc48e8fd255dc8149ab1d7d6ca1ed7f13932fef275156075a7c8fff07e70d295d56ca0f64be80d139665358ed1c76779fcc39f2da9a67ba97049c2bda7dbf48cfff97a34c40a8bcd3b6f4bb7edaa47b48aa8a13342d0eb10ec487560605cce991e853eb08def981dabaaba6afc21e725ffdb7036617583a164fc20bcb1a87b38e8d7dd99b27c31f2977caa558a36e0c214ed9c684992949eda9a3fcb8f298a0f99ea86e3896a9c0b4ee271e050a5a5339043004e99b3018810e1ff1d14bbf0e55bc72a020fb7bfdd1ae59355ba286e035390e30ff16bf1204dff31c5bf3c5cbc4b3884256dba7d79b78a01693b9480f5932d2b7088a07479bcf3a6a2040766d406d3abdd760b7d5ba029f3a6e647b24645d0713dd1018b06c2c20f365eb16fc446132a839d7879142e64795ee40e2f731fda6fd02599eece9e7e9d0dd71bd876647037ec07eb2580fa2c92fb1b5f7d9c5a814e5e1cad1f0d4d5c4ee65484fb7686b068eaeb553d1d97d15b7dd75a51ae98de8d73670b4f66a2077c28fa0f5a511ffd5796618d5035e0db4f9961f2ac0a130de0a996dd1082953b9fe01edf458b10e672dbd94b11ef42a26342600226b9dcfb1965f97cb39653bc10b8f630ea8ae6d2d14fa8beaee2e799f2b7e5ea48494bd369a06756bb659285e3377c22179263b5b4da586bb7c9d1b296b6a8781842a32c20636cdc5474e96c6cd19cd729fe3a1911b33b5f828405f9e54b3dd608c3294a0d8efefde8b307e7954905c7d9eff5e1d1faf727b4ac7d9df6595273da63b4ab99be72e9ad663ad4ce4a0b86436c487822c8ef3dea11aafff52427a6383e3cc3f4c5dbb752f69387165ea85ba959e5338e73abd4b1b9bf153309052c8634b975a2ee004bcad4e697c1d9fea9f0271b39c4d95b741ed5cbd7964df061795714af1b013cdd26c08fb388e775667f9c039d32b4b412aa5bf1e0f37d8a6683d023c229b5acb46c0e37c812c3af2eab354f1baba755818a5f411e170cdaed56ea66670932b52c5003df0856b45051133121197d1c2c994952d24cdb7d7e5cf43c7ff01e0e7cfd0a9254117e15e02287b23d2a1fa9ce08d7a3576b5cbd77320aca414a67ab764cd7a3660516fa072ebb649a434c0d46becaf3a89b4d5f7173cb2d70e8e1c366f848029bbf63a595bf30259c38c0f778f05354e04c4e09ee8c7be68973f8ab6963b7a7155191f93b8e7a3f11e8916ad14902f320873dfca65aa1ff2a66715f7536db848bce5b91ba64e0cc47d4094056895ff9495ff6b5e81e1d0ff17b19ea633a42ad4458d56d69d8d7ddc74c9b22ec626e20fd12bea436f302ca2d41eb4f51c31fe7b830c7580285dd0a809cad051ae9d203df8345ea2df0dd3403dc8f12a294e82c56bd37010c353e66e7bdfd6ac0055240df1ea1c8b70c6b364f01c303f94d2bee9e722cfa4cb3d80512e2dbf7498eec4d44b753ee2806ec54ad5690192681af3b5f681452fe61ccf19d128a006a152fcf4d68bd0cd44f68074803f3b353f2146d799bd2b97199063ed335b34a3f1eb229c532660c2dbe01d351ccac3dd3cd654cc15d1ddad1088ab5ffab27340afbf7bda0fa9ccfcf445193891f678058ba0c0adac5d033c4704aa7e10c51688739d349127217be1594d8a577d1827c2a03ef9ace0799f23c2b7a6588144409285d4bedad498cfd13920714a1cc1266ea3f68f1a80361670fe04ce80dabb59724137ccf0cfb49cc7488ba9680337abd40d5beb89b915d34842e17e87dd8a5ea86c17aa3f3fd0b2762858c531602bf3a47f6d5d20467f6273f26986ec371c6771693991ddf91efb750d0840bd73ca888abb58d1405578af31cc33c2b7058fde59aa0d0e0496664ff30454c2358a6554f2cba290ed7942d1d6df7709910b510104cad44f6aa5509411665c5863ef144203739b1163b4348562ea5603f0d71767a36bb70cca81e0a851cebc2dbf05746ad70d29f6db2c7e493fe8aa8ebe6d51cae3f23bdb4a6281551a78f9dcb80c2dfb860cf4c7ef88627bd6d45ca64de38d90b7c8d68dfd71c11888eb81203d970cfad7cd004513f4f32c87b8dd118fd3326e3bffd229978e5f007b1a1ef774e7f0b3acdff97f88d688cf4316545026a8973d136a0cef80882473542a13e195397b31914d97ecf0cd96a64f04a53539fa1259baca617c2e4c31c3d1a31f0c5a0aec1183a368b515e96e9e24d3deb14988431b3728db95ca74b31b8e3ea0740080f7ba08a72cd379d806771246ebc33d1561115548f0af82d896cd419c93dbf9ad3b9095d689be368c74f4604fe7ad8691ae89dbf238705dd8f21605d1b0a0d859d8a9cfbd5e6c024cc6108e6d9dd6fee7a57a0b2a0a1dcd67fc4c8e35681e0efda8870a05391374088d196eabdce7101340d0ed722f901a16e82456b6f292c218a76acd8e1ca2a2cf4f6e281196e01af00a4ca99649da55bdc1f020ccd215a2864c38fadbc080d5f5919b4780c49c073afe78264a138ba6aa516929", 0x1000}, {&(0x7f0000001180)="cd3fd05add5163b9d0fa2848360cd06b63da790eb7660b71c0899d67e07075ef51fb2081fcb1597cfd6562a1c2d672a0e716645e53ba705884c98535e7af7c46b5803318299214654fdf47fc5d70bc28518bde9f261f526c12498a7d9f6a0b1d2369090591c2a610f6013a09bfab227f131614adfacf6866b75588ea02698fa521511a394434c378c5d58823e3399468a667383253ddcb6303699bb914e32fd360643c9846adbaf7970f39", 0xab}, {&(0x7f0000000100)="3ffa2960ffac", 0x6}, {&(0x7f0000001240)="a3b8c49c9e80cb0340d724564444898392454f9c4b0facbae369d97f4ad5849ae7238377a03ce53e56e68f5ae25ad38d2506d30700d9ca5b9082f450302b35b70ae2574aac14415c7ca9343684851a110313092627", 0x55}, {&(0x7f00000012c0)="ee8f5acf8722b3de612a9113b033b72c0e036fd551dbb8ac1f66b3b5251fbd8105c3846a5c80cfdaf10a5c65debbe0cde687d7c9103d", 0x36}], 0x5, &(0x7f0000001380)=[{0x60, 0x10b, 0x4, "bd4682358295ed74539c2670525261cdbd70ecbe0b433aa9f0da8145a0451736c3c3cff23fd55d27c50cacdfb77d8a0027975062857d5025f4acbde01bd82d646d51621fca8dec79f1176284"}, {0x20, 0x112, 0x10000, "e0aeff00a66de8c17591"}, {0xd0, 0x112, 0x8, "e139a865f19582dc9d8c302db9fded68788ad186ad32367cf9e06b3866a21cbf4d923d42834e0734f09c33e993060edabb3d3e8c09660c64f05a8c0320953642e96a8e2a7c5a3664482b127071b957f1286c90ea0523f6b4ab2c1afc2e7cde3117f90637c59c163e5580307a003bc1ca9847ff0ebb7fe8249201dd27a3d6f2f1d3248c10bc64384050b0e69cf8ad5e807dd421864ff05a51d8e0a37f76c258ede8cde2bfa69b97e6ef539016bd89a8f7dcb52cdbdb75d7f830cbcdd710d04b"}], 0x150}}, {{&(0x7f0000001500)=@ipx={0x4, 0x1f, 0x101, "9f94ef5f7a52", 0x8f}, 0x80, &(0x7f0000001700)=[{&(0x7f0000001580)="607d96e47784196d34754e871eacff20c63d495f2cedc38fc68780190a1dc9d7f1c707548747543e0a369c26913ff54fbc12ec64eb4254e1b817bb677d0d9adbebc0f166faf5bfb6f35b49dbb027f3fa7574d62cd398f306cf", 0x59}, {&(0x7f0000001600)="3ead1ba17a244f14c75c876ac6d54c9b753c13cb8dd7ce398b0701efaf0ff2845b310091e72f49ad7a46f07bb7473d28981481d385819b20b0267803a81a3c2100207ed65af01552754999d5e4287da04d825619dc41e79aef4b330831490deebafd2608570bd40a6c55ebeac9a7b5488fdb7828b146c84e75471ae5a3c6f041d505e024012cb62d8318967e82fc308ecdfdf976ab94388f4e1a79999f9d8468af0507765eff9dc78cb9ea17e09ea7175bdc151c17a6ffcc660c728ec0d09cbfda710dccdd372a076b6f276c7fa109c5b95035009ab597f9935ca47c0316e37cde0fcaf67754634eea69", 0xea}], 0x2, &(0x7f0000001740)=[{0x38, 0x114, 0x1, "113088e138a70abecd894510911cb54e57dc18d4fde67ea2a890ac96dd170c058671"}], 0x38}}, {{&(0x7f0000001780)=@rc={0x1f, {0x2c, 0x58, 0xff, 0x6, 0x1, 0x5}, 0xff}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001800)="d0114d5a6296ae2917dc3d5e0be0c1fd7a42d0d69cf5795ebf8ab810819537784ce31a5ea379eaa1ff17278e110e7b0289b59870e7184686e66089e1afed4e5d07a4f57894e5df88bbda1c05eee08014dbbf85f5be2259ee2162f189093210cc79e0ff0116924dfc04e583278ec64e5aef9f6d5d6a8ea3f794ff29bfd5c3b23de5bbba9d884b4a7893", 0x89}, {&(0x7f00000018c0)="e9a7520e2337363dff7d50ec00faaa916eb75a29c068d09664448bf802fc7da3b955f2a7240af4b068d4b1c00fc353af9a7be0209a964af515aef692dc7a8865d6cf66157a44a0a89b856797adc65a8387a41e608ccdc54336ebe367d64b72fda18ba88845ed2bf9f04665147a6897c1ee47307f60bb6512a5842b3514256925c6382d005c6805532a053f9867c4f7dfd92f30d5c5d6ca3b9c714114d4fb", 0x9e}, {&(0x7f0000001980)="5864710353e50a0eb26b6efc3018b8754058287cd0a513272f566e1efae15c6730896f0d2e1df920af220089db59f360dff6d38a25585ad9e69ff93ca3b80b664b1aabbcc51307335fa03cb7010c8c7e999b58c6448b58271143ec87707751711c8c01b32dd59f404f3c8c4d997cb39f155e7f923bceb5c0fbaddeb9fef3203c02f0ea78dbe26a3602c9f3a70804f401b9f2b934ddf40c91067cc81cecd9", 0x9e}, {&(0x7f0000001a40)="7bac87a608d8b6e64ab66c4e8755420ef96d81ea6c0d273c8e2c50fdfb5b1d3c3b18f4e87241474ccf5f46e5166974f6eef772ae80a4ce551c0197d0a3960a2b6a", 0x41}, {&(0x7f0000001ac0)="9d9eb9b042f9be5935fb427c8684dd753d033aa8a7e729135ad5f6e535b646c9027e82ddb64d9182e0153fc1b20f481b8b14b3bbafc66be1339ff78fa61eced882cdf5819254e44a4ca5b33cba59805a887f90cfd839dcc63a64d321dc70155bfbf45053455f84f4b43aa09ec3668ed623b6801d009f54de8f1d9af99b240e5fb573706d982a4c1052263fbf7993a6a8a56a8520d8f7666a9e6b94202a393f17318cd819eacf40ab87fd534ccf69ca77ddf9fd83feced92b2f92ba4f13e159a13b5e9a35fe11c846abae337a7e616842439124005ede52fbec70fc951c1da5b7276b8b77298f26fb", 0xe8}, {&(0x7f0000001bc0)="7866fc81c47ed686d244d15cc488cfbe669d", 0x12}, {&(0x7f0000001c00)="5fe8797f152cc4ea803d11ea4c04d7faddb34db0431f7347bf0ccaa89201c97e1dd888a13f54ae8497e2791545c2840c0d386a65458d99048081a1e849f8fc73147c5b18d02a2f03a222e6270f06da34ea285121b6a7794e6f13dee03d17c286aeb284cf6840", 0x66}, {&(0x7f0000001c80)="139403f6a147df9698669168195a21785292040fc7ba73e13169ec8cfdd06c97055ef22118f4b373dda2c7dcb7252e6cb957c82f86c2c3a2c619a82061d3bf5dfe4a8af4b55f98720b7378122773f9b6ee496ef78b2fdd7f10589dc0b5cfe5b7ae2b55a8da26e4f96370de21858140971ccabf7c318e3ee284e1608dac77cfaf8c865a15ae58736de7673856e38d1a1ccb6c0362ded8642fb5d950c6ecd960b88a88b120d1", 0xa5}], 0x8, &(0x7f0000001dc0)=[{0x90, 0x29, 0x6, "8d96d3aae0d393999766af6dfb9c021ac41613ec358c451516ce8f52aadfb41fb52d39aaf64e548539c58c72af6ef5778fe0bba77c18e3d1771a67fad299ad4d5069bfee77d3a3d9941a7401af49b29064651b8dff89e95b2cb7925359aa9cf8c9b93c6b495e18761ddffa9b3a37b713451458e3468795ed19b3f8de040b"}, {0x30, 0x10e, 0xf3, "c10171d31ff61121afe14a433296f2e1fd280d24302027fb09105b"}, {0x20, 0x0, 0x7fff, "d586625294002e593d14945f"}, {0x18, 0xf112cb7a5f942dc9, 0x2, "096e95d367d7dc43"}, {0x108, 0x116, 0x5, "17163a44adb19454c68a0046005107968e14176f183c6d2c56b55d2c38d71e9f1709f273da9c9379732c550d27ed071078c44c8dc2fdeeff16ee72f794f876b8ab596c999737e1bbcb13a117bc3fa5f48ae113f22c86b2affe29cdd427c90a2150fb7f2c5b14a2e12207659263e7a3de517b10aa97995441bacc2b20541cb38ebcc0bc135a22662e9aaad8118a9a816516ea3c24b13e8b3e497882c87ebbaa79ff1cbcd8a05c3e10ccf7c2e2aebd43e2fb8126f1b6a40aeb25daa0d38a14dc950f7185b1003428e43590fdc801fe32e0d2cd21b83316c942e9a7f3f354c7d132b89379c65c9cd490fa4384fdecbb570e802c65"}, {0x18, 0x301, 0x5, "8dbe"}, {0xd8, 0x1, 0x3, "1b2bb3741585cea166f3ec389673be13787a90450360de10c89c09d5c5b6c9f88dee84cfb71ec88276ba5e6d90c5ec4872885110e1174d3e2f7c3df873545821a4ed875be5f3f4ade53a2f39fb084f1322320fa6ad80f58f658a132edea725edb6e481088507de7ce693d895f85488ab19bc7cacc38f382e6dfe228d60c4b8bacc208959c3d7d77036526426f0ee28592ad40ff69f5bd9df77363597cd070243471c286d1134688017e58de4db945ac8243eb4942e73411f63f963f97e7967a489dd445823"}, {0x98, 0x105, 0x55d, "397d6a1981ed52358c48bf6a1134c16d6def4b8c0c70f5b7d781d87116a0b336128bbbfa6555bacfe6eb15182f4d6fc1a0702283d0c1bbac6029af91b5f1c34339d7a535accaaa774e79faf52c95aa94a1c49c8f6db4972bee9dd5f40f070d224e88205fe54338b096b6d761cef6b7085cb8e7be5ba06109b1e55f180eb015bb04c2a093a489"}, {0xc8, 0x100, 0x6, "472716c5bd62bbbb3f705a177e438dcdee747b5fa472f559bf2da31f428fbc9281c939858c262d83ed9585f5bc2e73787af6f35b0eb92c0265053dad2dcd4db5b523e8cce28c8e765f026cf4d10d649818a79a6d480a6239edf2773e7bfea776b9c53fc60c95601ec68e19d2961a33459e016c7e387d93e960bcd004f3761ea77176a11b570d2b9cae0e113e25bbadc08a29c8ece84a81c1af9964862f5a83afb7397d719e7041e0aa87bf9f2c0ce37e32"}], 0x450}}], 0x3, 0x4040040) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:30:59 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_SIOCGPGRP(r3, 0x8904, &(0x7f0000000040)) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 872.071140] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 872.140560] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 872.204461] audit: type=1400 audit(1573846260.135:2698): avc: denied { create } for pid=1972 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 872.256343] audit: type=1400 audit(1573846260.185:2699): avc: denied { create } for pid=1944 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:31:00 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140), 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 872.327507] audit: type=1400 audit(1573846260.255:2700): avc: denied { create } for pid=1972 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:31:00 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x1) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0xffffffffffffff2e) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:31:00 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$selinux_attr(r4, &(0x7f0000000100)='system_u:object_r:fsadm_exec_t:s0\x00', 0xffffffffffffffd6) [ 872.511335] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 872.660517] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:00 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='\x00\x80\x0f\x00\x04\x00', 0x80000000, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = signalfd4(r0, &(0x7f0000000040)={0x10001}, 0x8, 0x80000) sendfile(r3, r2, 0x0, 0x5) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 872.937259] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 873.250630] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 873.296244] keychord: invalid keycode count 0 19:31:01 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140), 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:31:01 executing program 2: clock_gettime(0x1, &(0x7f0000000000)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 873.382653] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 873.407575] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:01 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_WIE_ON(r2, 0x700f) 19:31:01 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) splice(r3, &(0x7f0000000080)=0x7, 0xffffffffffffffff, &(0x7f00000000c0)=0x100000001, 0xbb4, 0x6) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) fcntl$dupfd(r4, 0x0, r5) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000040)={@rand_addr="81d907dee83d2698801a4aa2701048ed", 0x81, 0x2, 0xff, 0xbd83a8d7a6bef11b, 0xffc1, 0x86}, 0x20) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:31:01 executing program 4: open(0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) io_setup(0x6, &(0x7f0000000000)=0x0) r4 = openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) r5 = add_key(&(0x7f0000002000)='logon\x00', &(0x7f0000001000), &(0x7f0000001000)="1c989cc9f58ec796be4720e6160291a2fb7c6445e84b8e9e349ead029fe38d5810bf992b5d51f406a51cc339021268aed6f767582af42dbc8ea1110e4353fcf30b20f1f27ed3b44bef6444f8ca6a808e34ded636ef55e151c11b4ef7a5384f4a0ceb885759dfeeca5aaa540de461d2130755897533032f5639c4ba79988a49d63084f2cbed0a84e5e733146f15192fdabd0e3a", 0x93, 0xfffffffffffffffc) keyctl$read(0xb, r5, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000580)='keyring\x00', &(0x7f00000005c0)={'syz', 0x3}, 0x0, 0x0, r5) add_key$keyring(&(0x7f0000000500)='keyring\x00', &(0x7f0000000540)={'syz', 0x0}, 0x0, 0x0, r6) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) r8 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r9 = fcntl$dupfd(r7, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket$inet6_tcp(0xa, 0x1, 0x0) r11 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r12 = fcntl$dupfd(r10, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) io_submit(r3, 0x4, &(0x7f00000004c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x1000, r0, &(0x7f0000000180)="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", 0xfa, 0x81, 0x0, 0x2, r1}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x6, 0x80, r4, &(0x7f0000000280)="dd7e970eabeacd42f1fb7f1aef929c638cbbc2b96d79f341873b00589d2a2371c56589cf21381b3e26ccaffc595d387cd814de5ce443c4cf24903db8f554a6e93a5aced5dcf20979830c01a1cce76b4296403b7a7a2fca78f782324a0aba94f7300ea994417b", 0x66, 0x0, 0x0, 0x0, r1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x7, 0x3, r2, &(0x7f0000000300)="8c7980083e383c6ad9c7573c3cf108bb3fe0e894b40b74ab1317ee1ee2362ca185e4da491365de227dd5467b447219091006dc6cd24a7fba798526e2171f9f3cd4960b3de313e2db22107787f57b1bf54651da2703f7a1348bab8cfa45f2e1bcda919935add0f2cb21409cfa5831d48cc54ed77874a4afd34b107d690417ae924c19711677b7b7c5b81b9de244811db28f3627571d4c400feb225e5d9b", 0x9d, 0x2, 0x0, 0x0, r9}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0xfffd, r1, &(0x7f0000000400)="66245a85ceb92e290247577cc862c9003c819e4a6b61173f3caa8f01a7a0be518d961a05d1ba7ace647991981e6742be8f4ef15a4d94ca0794ecc45f5a145c0bc5ddad2f1199e985aa3b47fbc11ee1732bdb5d3ac35005ddeabe6055e5fdf0", 0x5f, 0x5, 0x0, 0x0, r12}]) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 873.791692] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 873.961312] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:02 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1, 0x14, 0x9}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x40}}, 0x0) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 874.151845] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 874.165330] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:02 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpgid(0x0) setpriority(0x2, r0, 0x3e49574c) 19:31:02 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 874.401095] keychord: invalid keycode count 0 19:31:02 executing program 4: open(0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="020300000a00000000000000000000000200060000000000020000007f000001000000000000000002000100000000000000160000000000030000000000000002000000e000000100000000000000008ec87763b71310ca7160b1906f5f133a7d01dda23085d64c24d1cad7f47d81fd25f7b9daeecec3ca16a5402f18a6c6d6b16736b984fde258948c0a436c9bbac901c3e911bb2ec04fdb4a39c49aae859d3ff7d52334f70e32c040c143cd25dd0eec5ccf6de7efabcac1200f7f07d4620754f87f7b9b1be1d1b8f114f525565e5a0041516939"], 0x50}}, 0x0) pwrite64(r0, &(0x7f0000000180)="574a9c2058fc9c824f94905873cf555a69a257b1e360331b68c64350a22fdbdd013a68d077fbcff50d9982780271980df8fbec8fcd9f9fbfdef7d626cb89e3b7d36e5a8d7e16c3fdf0de3fe648ff5257145442673ba0f8399f4309bb4499d650079e5a0b1106dd826718b7d0aece449c3a4675dde69ed7a1c0df258d61a8680f1ac88ae8", 0x84, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) r3 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x10001) r4 = gettid() ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x3c) ptrace$cont(0x18, r4, 0x0, 0x0) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) fcntl$setown(r3, 0x8, r4) write$eventfd(r1, &(0x7f0000000140)=0x9, 0x8) write(0xffffffffffffffff, 0x0, 0x0) set_thread_area(&(0x7f0000000000)={0x1, 0x20001000, 0x4190864877d5e0ec, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1}) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x1200) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 874.570602] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:02 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) write$eventfd(r4, &(0x7f0000000000)=0x20000100000001, 0xffffff5d) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 874.761055] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:02 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x6000, 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000080)=@req={0x8001, 0x40, 0x7f}, 0x10) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:31:02 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) r0 = socket$unix(0x1, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_link_settings={0xa}}) getpeername$unix(r0, &(0x7f0000000000), &(0x7f0000000080)=0x6e) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket(0x100000000011, 0x2, 0x0) bind(r5, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14) sendmmsg$inet(r4, &(0x7f0000001080)=[{{&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, 0x0}}, {{&(0x7f00000004c0)={0x2, 0x4e22, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @multicast2, @multicast2}}}], 0x20}}], 0x2, 0x0) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x8000000000001c, &(0x7f0000000140)=0x1, 0x4) setsockopt$sock_int(r7, 0x1, 0x1e, &(0x7f0000000040)=0xfffffffffffffffc, 0x4) r8 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r8, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) bind$inet(r8, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r8, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000002a80)={'rose0\x00', 0x0}) r10 = socket$inet(0x2, 0x2, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r10, 0x0, 0x10, &(0x7f00000032c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@initdev}}, &(0x7f00000001c0)=0x36) sendto$inet(r8, 0x0, 0x47, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_script(r8, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"], 0x3be) setsockopt$sock_int(r8, 0x1, 0x1000000000008, &(0x7f0000000000)=0xda9, 0x4) write$binfmt_elf64(r8, &(0x7f0000000580)=ANY=[@ANYPTR, @ANYRESDEC, @ANYRESHEX=r7, @ANYRESDEC=0x0, @ANYRESDEC=r9, @ANYRES64, @ANYRESHEX=r11], 0xffffffffffffffcc) setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000000c0)={{{@in6=@dev={0xfe, 0x80, [], 0x13}, @in6=@loopback, 0x4e22, 0x8001, 0x4e21, 0x7, 0x2, 0x80, 0x60, 0x88, r6, r11}, {0xcdc, 0xabba, 0x4b6, 0x1, 0xffff, 0x3, 0x1, 0x59aed87}, {0x5de, 0x7, 0x0, 0x4}, 0x3, 0x0, 0x2, 0x0, 0x1, 0x6}, {{@in6=@dev={0xfe, 0x80, [], 0x19}, 0x4d4, 0x3c}, 0xa, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3502, 0x0, 0x3, 0x84, 0x1000, 0x65b}}, 0xe8) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r12 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self\x00', 0x10000, 0x0) r13 = gettid() ptrace$setopts(0x4206, r13, 0x0, 0x0) tkill(r13, 0x3c) ptrace$cont(0x18, r13, 0x0, 0x0) ptrace$setregs(0xd, r13, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r13, 0x0, 0x0) fcntl$setownex(r12, 0xf, &(0x7f0000000280)={0x2, r13}) [ 875.021852] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 875.311872] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:03 executing program 4: r0 = open(0x0, 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7, 0x1b, 0x1}, 0x7) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) sendfile(r1, r0, &(0x7f0000000100)=0x4, 0xffffffff) syz_genetlink_get_family_id$net_dm(0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) prctl$PR_CAPBSET_READ(0x17, 0x1a) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r3, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r3, r2) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000080)={0x8, &(0x7f0000000040)=[{0xfff, 0x1, 0x2, 0x5}, {0x2, 0xc0, 0x6, 0x4}, {0x9, 0x4, 0xfb, 0x20}, {0xc191, 0x7f, 0xeb, 0x3}, {0x7, 0xeb, 0x3f, 0x200}, {0x6780, 0x4, 0x7f, 0xc0}, {0x4, 0x2, 0x40}, {0x7ff, 0x6, 0x3}]}) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 875.431078] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 875.440340] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:03 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000000)=0x9, 0xfffffffffffffcf2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 875.670496] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:03 executing program 3: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x10, 0x1) r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:31:03 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 875.957894] audit_printk_skb: 78 callbacks suppressed [ 875.986631] audit: type=1400 audit(1573846263.885:2727): avc: denied { create } for pid=2105 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:31:04 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000080)) ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:31:04 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 876.141032] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 876.148449] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 876.237276] audit: type=1400 audit(1573846264.165:2728): avc: denied { write } for pid=2105 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 876.412060] audit: type=1400 audit(1573846264.345:2729): avc: denied { dyntransition } for pid=2129 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 19:31:04 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r4, 0x4c01) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 876.511733] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 876.567608] audit: type=1400 audit(1573846264.485:2730): avc: denied { create } for pid=2133 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:31:04 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='t\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/load\x00', 0x2, 0x0) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 876.755289] audit: type=1400 audit(1573846264.685:2731): avc: denied { read } for pid=2105 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 876.848936] audit: type=1400 audit(1573846264.775:2732): avc: denied { write } for pid=2133 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:31:05 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r5, r4) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r4, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x211000a0}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r8, r7) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 877.171736] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 877.190371] audit: type=1400 audit(1573846265.115:2733): avc: denied { create } for pid=2105 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 19:31:05 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clock_getres(0x1, &(0x7f0000000000)) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$KEYCTL_PKEY_VERIFY(0x1c, &(0x7f0000000180)={r0, 0xe}, &(0x7f0000000680)=ANY=[@ANYBLOB="656e631f6f61657020686173683d7368613531322d6176783200e88c97a2ba410026f3a06772000000000000d54b6be6ffffffffffffff0000000000000000000000000000000000af00000000000000000000000000008aff08e38e74f69f707dd02d0fc6d0cbe581f2f0e582e2d26c"], &(0x7f00000001c0)="772724d4ac2b107bc7befd976d50", 0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000000440)="e908e8f61f67cec490dd338c4c5fa27971fd6d45ffd9409df36dd6d7403e3d2778e8caf6cc2d83db1d83fefe0ed9e99c3a5e6f77111e99ef37a3bb371e4b8688148b5b8680c3844950691ba11371258101253b88f6a885768213a0b231283fbfb0eaf55e4077a0b955813d244f489f394dbeb73dca28e46f5144ebab92cf75d08eb947bd871a2831809ee4e1f22f4cfa5a02741c45682f967e8e7fcfffd8d0f55bcd23d82a66a0ade38e1977890824da47a97e6b7711e9d7fd725337461cd396cc8cc37085f534a51c13c389dbf419acbf40048d6c1078aeb35420e4f13aa7eabb0301d9aba462e54a10", 0xea, 0xffffffffffffffff) keyctl$instantiate_iov(0x14, r1, &(0x7f0000000580)=[{&(0x7f0000000040)="a66538f493c55041df5d371964345ae5a350f8e4e34b1d7207807c45fc1378a4a3dae4c0e77d255cd8562c59532460efcd94c7415d15351842fdea8d04f8c3671e2e56d6c1ffafc91718d4e58b4d5f7809c326849d3bd15f22657519184af4955c2bae93e9e750eb23eebc526a3452257aa65591dbea51009ebb14b8733ee4b0144d7b133383bf64c74a6e5b11a8304f3b5671ca45c9d705aad9f53665fb6974f136342e15dc34b45edae97d17b5c413f3cd4724db28a318fe3309eba183de574145b07a1297f4a976e78ead91894c430a1a219f8816c79abef86dc22c89f87ce8ec505373", 0xe5}, {&(0x7f00000005c0)="4685d5676d5014a2ac8b2c84f6a3c5c58cab6412e06b5e8251e0eb41a3b350d7136197732f8765159f6e9220f4436a12284c289335af8bd5e34f5f8228191415adbd9e9d82b9762d6c0c8603e86fbac1772a78e2397da05fc58a807e31017cfabf5b4e6c4b9dc3330db7d7b32caf4c023dd5c68678b578c697dcd99d3e337228020ce043e6b1c0240d", 0x89}, {&(0x7f0000000200)="2def860ce586dafb7f4f3558ca065021244745a6e4ce48fe0c8c03a59a6074ff5f984729575484e49a6b776c9ce6c7e348706d7fe613f97a7e83fa9763f1101e3bd11178563605b696e26e4fc9d6f2da3fdd95d137a62f3a8d4d58f783c50c1933080f8cd2e32b7e48988ea05a633e11457d542518a383a1d0ea7e40ddf0831203ee5c5c35cd6fd24f7768b9399fa820ad501c6d0a8683fe23cefa42462e73de8d6a29caa27aae3664a6eb431fd718a28ee77e2ce28572b05441ce507ad57005a1bba525bd6708807a169a315a95328dbbd858358e1c6b8efc7f233c59268ce32eb66b", 0xe3}, {&(0x7f0000000300)="a06df6b8836a9845ab6a797cf12b6075ef2abbd39a1c178fc1bde95ca679a87f51dc565f5664fff14c3561524c5e6212e02e1fe03e03ec9147ad365a6088a3ce5b4df7d0f422d3f03635fe0e615f412c3a1031fae38030c26b651e1ad090e45c2c12c57319", 0x65}], 0x4, r1) 19:31:05 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) open(&(0x7f0000000000)='./file0\x00', 0x40, 0x48) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 877.431166] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 877.440361] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:05 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000080)='GPLppp1mime_type\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) [ 877.711153] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 877.812671] audit: type=1400 audit(1573846265.725:2734): avc: denied { create } for pid=2175 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 877.964893] audit: type=1400 audit(1573846265.895:2735): avc: denied { write } for pid=2175 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 877.995158] audit: type=1400 audit(1573846265.925:2736): avc: denied { create } for pid=2179 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 878.070301] keychord: invalid keycode count 0 [ 878.080660] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:06 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/a\x93\xfbh7m\x00', 0x2000, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00', &(0x7f00000000c0)=""/4096, 0x1000) 19:31:06 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) r2 = dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000300)=ANY=[@ANYBLOB="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"]) [ 878.221660] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 878.230315] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:06 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) r3 = socket$key(0xf, 0x3, 0x2) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r5 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r5, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r7 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r7, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) r8 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r8, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYRES64=r0, @ANYRESHEX=r1, @ANYPTR64, @ANYPTR=&(0x7f0000001300)=ANY=[], @ANYRESDEC, @ANYRES16], 0x40}}, 0x0) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000040)=@md5={0x1, "70a9f9213a1337d50ddbcabab1e1539a"}, 0x11, 0x2) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) r10 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r11 = fcntl$dupfd(r9, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_mreqn(r11, 0x0, 0x20, &(0x7f0000000080)={@multicast2, @remote}, &(0x7f0000000100)=0xc) 19:31:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x40) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x80802, 0x0) ioctl$KDENABIO(r3, 0x4b36) ioctl$PPPIOCGFLAGS1(r3, 0x8004745a, &(0x7f0000000080)) removexattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)=@known='trusted.overlay.upper\x00') [ 878.572439] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:06 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, 0x0, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:31:06 executing program 0: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) ioctl$LOOP_SET_CAPACITY(0xffffffffffffffff, 0x4c07) ioprio_set$pid(0x1, r0, 0x0) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$LOOP_SET_DIRECT_IO(r5, 0x4c08, 0x2) r6 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_opts(r6, 0x0, 0x4, &(0x7f00000000c0)="a118b6f703ca374da3813a2c43e3781cad1ba39795ea53ed411a4e04a724b824aa821e42d1fdc89a17de444f7b3c77818f7962f82b3e381e01914398dbcf8ae0d16bab2f5ce35042b7e05caa50b95cb0cd80722646d570fc005c22f5a99fb1", 0x5f) prctl$PR_SET_DUMPABLE(0x4, 0x0) r7 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) wait4(r0, &(0x7f0000000080), 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r7, 0x54a0) 19:31:06 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write(0xffffffffffffffff, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r2, 0x400c6615, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 878.840726] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 878.848116] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 879.060576] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 879.210561] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:07 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200), 0x5, 0x0) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socket$inet_tcp(0x2, 0x1, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) r6 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r7 = fcntl$dupfd(r5, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x3, 0x4fadce8fff488016) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockopt$inet6_mtu(r10, 0x29, 0x17, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$GIO_UNISCRNMAP(r7, 0x4b69, &(0x7f0000000140)=""/139) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r11 = openat$cgroup_procs(r4, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) r12 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r11, r12, 0x0, 0xfbffffffffffff04) r13 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x20000, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', r6, &(0x7f00000002c0)='./file0\x00') ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e22, @remote}, 0x10) write$FUSE_POLL(r13, &(0x7f00000000c0)={0x18, 0x0, 0x6, {0xffffff80}}, 0x18) r14 = socket$inet6_tcp(0xa, 0x1, 0x0) r15 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r16 = fcntl$dupfd(r14, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r19 = fcntl$dupfd(r17, 0x0, r18) ioctl$PERF_EVENT_IOC_ENABLE(r19, 0x8912, 0x400200) r20 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x5bc6deb2, 0x20200) ioctl$LOOP_CLR_FD(r20, 0x4c01) 19:31:07 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x121140, 0x0) bind$inet(r0, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:31:07 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, 0x0, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 879.671908] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:07 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="020200000a000088f094000000000000000000d2d4c20a357f49a2890e96177a0200060000000000020000007f000001000000000000000001800000000000000000000000000000030000000000000002180000e000000100020000000000002ff82335c555cf83a05aefdfb359a7006790ead5aa62688b2eb45e189811bd59a23fd7607c4558e4b9c18e4613c32cc6e388b0fd866d5625e20cb5b2bf"], 0x50}}, 0x0) r2 = fcntl$getown(r1, 0x9) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x3c) ptrace$cont(0x18, r3, 0x0, 0x0) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r3, 0x0, 0x0) setpgid(r2, r3) prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 879.841451] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:07 executing program 3: r0 = socket$inet6(0xa, 0x2, 0xff) vmsplice(r0, &(0x7f0000000140)=[{&(0x7f0000000040)="a811fed91a5bbff977fa2927503800552a1d310a0b227fa5f6fb1e002299bfd4def6149a3d365ded22e3a88364dd9cbf7b56c3d67d5edb5dcc22701f63db5326bf28fdca5e69ecf1431720d5f5cd62005af69993afec8860ceb5b361d23d6c354db532cf2724be02a7ec523496ce50e7432dc2665c3d0794fe1ebaf0", 0x7c}, {&(0x7f00000000c0)="2110ff226da81dbf98e3c4c81332d4754d3bb2adb2f8499301", 0x19}], 0x2, 0x5) r1 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r2 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) r3 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r3, r3, 0x0, 0x27) ioctl$LOOP_CLR_FD(r1, 0x4c01) [ 880.090384] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000300)="290000002000190f05003fffffffda0602000063fee80001dd0000040d000600fe7f00000005000000", 0x101}], 0x10000109) ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 880.260580] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:08 executing program 4: open(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) write$FUSE_WRITE(r0, &(0x7f0000000000)={0x18, 0x0, 0x1, {0x8}}, 0x18) write(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, [@sadb_address={0x2, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @loopback}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x0, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x50}}, 0x0) writev(r2, &(0x7f0000000040), 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYRES64=r1], 0x8}}, 0x0) sendfile(r3, 0xffffffffffffffff, 0x0, 0xfffffffffffffffe) [ 880.411662] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 880.541433] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 880.965730] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:09 executing program 1: openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) setsockopt$inet_mreq(r1, 0x0, 0x20, &(0x7f0000000000)={@local, @multicast1}, 0x8) write$eventfd(r0, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) 19:31:09 executing program 2: openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r1, r0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r2, 0x7003) write$eventfd(r1, &(0x7f0000000100)=0x80, 0xfffffffffffffe3e) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) 19:31:09 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, 0x0, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:31:09 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) r0 = getpid() ptrace$pokeuser(0x6, r0, 0xfff, 0x8000) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 19:31:09 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) r4 = getegid() r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0xc0, 0x0) ioctl$EVIOCGRAB(r5, 0x40044590, &(0x7f0000000240)=0xffffffff) write$FUSE_ENTRY(r5, &(0x7f0000000140)={0x90, 0x0, 0x3, {0x4, 0x3, 0x80000000, 0x8, 0x20, 0x6, {0x1c1d, 0x6, 0x9, 0x7, 0x0, 0x1000, 0x9, 0x8, 0x8001, 0x7f, 0x1, r3, r4, 0x5, 0x22}}}, 0x90) socket$netlink(0x10, 0x3, 0xeea3ec94441d674b) r6 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) r7 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) r9 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) r10 = fcntl$dupfd(r8, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r10, 0x4c00, r7) r11 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r11, r11, 0x0, 0x27) ioctl$LOOP_CLR_FD(r6, 0x4c01) [ 881.231492] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 881.238899] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:09 executing program 0: r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ioprio_set$pid(0x0, r0, 0x7) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 881.343369] audit_printk_skb: 66 callbacks suppressed [ 881.385107] audit: type=1400 audit(1573846269.275:2759): avc: denied { create } for pid=2282 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 881.440450] keychord: invalid keycode count 0 [ 881.585372] audit: type=1400 audit(1573846269.515:2760): avc: denied { create } for pid=2271 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 881.585427] audit: type=1400 audit(1573846269.515:2761): avc: denied { write } for pid=2282 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 881.661015] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:09 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000000)='trusted.overlay.opaque\x00', &(0x7f0000000040)='y\x00', 0x2, 0x2) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000080)=0x20000000, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) [ 881.750540] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:09 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000000)='/dev/keychord\x00', 0x100200, 0x0) write$P9_RSTAT(r0, &(0x7f0000000040)={0x73, 0x7d, 0x2, {0x0, 0x6c, 0x40, 0xe698, {0x8, 0x4, 0x2}, 0x48390000, 0x7f, 0x81, 0x9, 0x6, 'system', 0xb, 'loem0vmnet0', 0x27, 'mime_typeselinuxwlan0selinux\'*!vmnet1[{', 0x1, '-'}}, 0x73) 19:31:09 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) 19:31:09 executing program 3: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000240)={0x1, 0x8, 0x3, 0x9, 0x5, [{0x7, 0x7, 0x8, 0x0, 0x0, 0x605}, {0x80000001, 0x1, 0x100000000, 0x0, 0x0, 0x1004}, {0xc71, 0x1, 0x0, 0x0, 0x0, 0x1004}, {0x143e3881, 0x7, 0x80000000, 0x0, 0x0, 0x1000}, {0x2, 0x1, 0x400, 0x0, 0x0, 0xcf0fd830cad26e40}]}) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x27) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:31:09 executing program 4: r0 = socket$inet(0x10, 0x400000200000002, 0x6) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="1b0000001200030207fffd946fa28308040019006c000079d72c8c", 0x1b}], 0x1}, 0x0) [ 882.100619] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 882.291459] keychord: using input dev AT Translated Set 2 keyboard for fevent [ 882.299849] keychord: using input dev AT Translated Set 2 keyboard for fevent 19:31:10 executing program 0: ioprio_set$pid(0x1, 0x0, 0x0) clone(0x813a4100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) getpid() setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000000)={0x5c, @multicast2, 0x4e23, 0x4, 'rr\x00', 0x462da024798ec65e, 0x4, 0x4c}, 0x2c) 19:31:10 executing program 1: r0 = openat$keychord(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000000)=0x55, 0x4) r1 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r2 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r2, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r2, r1) write$eventfd(r1, &(0x7f0000000140)=0x20000100000001, 0x8) socketpair$unix(0x1, 0x0, 0x0, 0x0) [ 882.435710] audit: type=1400 audit(1573846270.365:2762): avc: denied { create } for pid=2322 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 882.498926] kasan: CONFIG_KASAN_INLINE enabled [ 882.503392] kasan: GPF could be caused by NULL-ptr deref or user memory access[ 882.506480] audit: type=1400 audit(1573846270.435:2763): avc: denied { dyntransition } for pid=2326 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0 tclass=process permissive=1 [ 882.533742] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 882.540507] Modules linked in: [ 882.543829] CPU: 1 PID: 2331 Comm: syz-executor.4 Not tainted 4.4.174+ #4 [ 882.550751] task: ffff8801cf82df00 task.stack: ffff8801d3ae8000 [ 882.556830] RIP: 0010:[] [] __list_del_entry_valid+0x7c/0x1a0 [ 882.566071] RSP: 0018:ffff8801d3aef5d8 EFLAGS: 00010246 [ 882.571516] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff8800b9679e90 [ 882.576893] audit: type=1400 audit(1573846270.465:2764): avc: denied { write } for pid=2322 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 882.602709] RDX: 0000000000000000 RSI: ffffffff83e67b40 RDI: ffff8800b9679e98 [ 882.609975] RBP: ffff8801d3aef5f0 R08: 0000000000000000 R09: 1ffffffff075afe5 [ 882.612145] audit: type=1400 audit(1573846270.465:2765): avc: denied { read } for pid=2322 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 882.641083] R10: 000000000075bf20 R11: 0000000000000000 R12: ffff8800b9679e98 [ 882.648358] R13: ffff8800a8c46280 R14: ffff8800b9679e39 R15: ffff8800b9679eb8 [ 882.655632] FS: 00007f75c9496700(0000) GS:ffff8801db700000(0000) knlGS:0000000000000000 [ 882.663860] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 882.669738] CR2: 00007ffe25c1ecec CR3: 00000001d5e30000 CR4: 00000000001606b0 [ 882.677008] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 882.684310] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 882.691564] Stack: [ 882.693700] ffffffff82717d94 ffffffff8255c29c ffff8800b9679e90 ffff8801d3aef628 [ 882.701727] ffffffff8255c2a4 ffff8801c0eab300 ffff8800b9679e90 ffff8800b4fbe780 [ 882.709820] ffff8800b9679e39 ffff8800b9679eb8 ffff8801d3aef648 ffffffff825784e3 [ 882.717833] Call Trace: [ 882.720404] [] ? _raw_spin_lock_bh+0x44/0x50 [ 882.726493] [] ? xfrm_state_walk_done+0x7c/0x1e0 [ 882.732877] [] xfrm_state_walk_done+0x84/0x1e0 [ 882.739095] [] xfrm_dump_sa_done+0x73/0xa0 19:31:10 executing program 5: open(0x0, 0x0, 0x1c0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000580)='./bus\x00', 0x100) fcntl$getownex(r1, 0x10, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) inotify_init() fcntl$setstatus(r1, 0x4, 0x6100) pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) splice(0xffffffffffffffff, 0x0, r3, 0x0, 0x30005, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f00000003c0)='\bDM\x00') openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) r5 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x42000, 0x0) r6 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x8101, 0x0) write$eventfd(r6, &(0x7f0000000140)=0x20000100000001, 0x8) dup2(r6, r5) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) write$eventfd(r5, &(0x7f0000000140)=0x20000100000001, 0x8) sendmsg$NET_DM_CMD_STOP(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x14, 0x0, 0x300, 0x70bd2c, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x20004000) read(r2, &(0x7f0000000200)=""/250, 0x50c7e5e2) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x29, &(0x7f0000000080)=0x20000000, 0x4) add_key(&(0x7f0000000180)='dns_resolver\x00', &(0x7f0000000300)={'syz'}, &(0x7f0000000340), 0x0, 0xfffffffffffffffa) truncate(&(0x7f00000000c0)='./bus\x00', 0x0) open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) lseek(r1, 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$loop(&(0x7f0000000500)='/dev/l[\f\x00\x10\x00', 0xfffffffffffffffc, 0x100) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x2, 0x5, 0x7}) [ 882.744978] [] ? xfrm_get_policy+0x8c0/0x8c0 [ 882.751040] [] netlink_dump+0x76b/0xad0 [ 882.756660] [] __netlink_dump_start+0x4ca/0x750 [ 882.762974] [] ? __netlink_ns_capable+0xe2/0x130 [ 882.769377] [] xfrm_user_rcv_msg+0x556/0x630 [ 882.775438] [] ? xfrm_user_rcv_msg+0x630/0x630 [ 882.781668] [] ? xfrm_dump_sa_done+0xa0/0xa0 [ 882.787709] [] ? xfrm_user_rcv_msg+0x630/0x630 [ 882.793931] [] ? xfrm_get_policy+0x8c0/0x8c0 [ 882.800014] [] ? mark_held_locks+0xb1/0x100 [ 882.806008] [] ? xfrm_netlink_rcv+0x61/0x90 [ 882.811963] [] ? mutex_lock_nested+0x7dd/0xb80 [ 882.818171] [] ? trace_hardirqs_on_caller+0x385/0x5a0 [ 882.825001] [] ? mutex_lock_nested+0x645/0xb80 [ 882.831272] [] ? xfrm_netlink_rcv+0x61/0x90 [ 882.837227] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 882.843968] [] ? mutex_trylock+0x500/0x500 [ 882.849837] [] netlink_rcv_skb+0xd4/0x2e0 [ 882.855619] [] ? xfrm_dump_sa_done+0xa0/0xa0 [ 882.861658] [] xfrm_netlink_rcv+0x70/0x90 [ 882.867454] [] netlink_unicast+0x4d7/0x700 [ 882.873358] [] ? netlink_sendskb+0x60/0x60 [ 882.879236] [] netlink_sendmsg+0x6b6/0xc80 [ 882.885105] [] ? nlmsg_notify+0x170/0x170 [ 882.890891] [] ? selinux_socket_sendmsg+0x3f/0x50 [ 882.897431] [] ? security_socket_sendmsg+0x8f/0xc0 [ 882.903997] [] ? nlmsg_notify+0x170/0x170 [ 882.909784] [] sock_sendmsg+0xbe/0x110 [ 882.915304] [] ___sys_sendmsg+0x769/0x890 [ 882.921128] [] ? copy_msghdr_from_user+0x550/0x550 [ 882.927738] [] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 882.934476] [] ? check_preemption_disabled+0x3c/0x200 [ 882.941302] [] ? check_preemption_disabled+0x3c/0x200 [ 882.948127] [] ? __fget+0x13b/0x370 [ 882.953388] [] ? __fget+0x162/0x370 [ 882.958656] [] ? __fget+0x47/0x370 [ 882.963846] [] ? __fget_light+0xa3/0x1f0 [ 882.969539] [] ? __fdget+0x1b/0x20 [ 882.974709] [] __sys_sendmsg+0xc5/0x160 [ 882.980316] [] ? SyS_shutdown+0x1a0/0x1a0 [ 882.986102] [] ? SyS_clock_gettime+0x118/0x1e0 [ 882.992318] [] ? SyS_clock_settime+0x220/0x220 [ 882.998535] [] SyS_sendmsg+0x2d/0x50 [ 883.003884] [] entry_SYSCALL_64_fastpath+0x1e/0x9a [ 883.010449] Code: 00 ad de 4c 8b 01 49 39 c0 74 66 48 b8 00 02 00 00 00 00 ad de 48 39 c3 74 78 48 b8 00 00 00 00 00 fc ff df 48 89 da 48 c1 ea 03 <80> 3c 02 00 0f 85 fb 00 00 00 48 8b 03 48 39 c8 75 74 49 8d 78 [ 883.037695] RIP [] __list_del_entry_valid+0x7c/0x1a0 [ 883.044559] RSP [ 883.048225] ---[ end trace 52da1c6dfd84734b ]--- [ 883.053003] Kernel panic - not syncing: Fatal exception in interrupt [ 883.060072] Kernel Offset: disabled [ 883.063692] Rebooting in 86400 seconds..