000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = dup(r0) ioctl$EVIOCGKEYCODE(r1, 0x80084504, &(0x7f0000000240)=""/174) 00:15:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:15:33 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f0000000140)={'syz0\x00', {}, 0x0, [], [], [], [0x5]}, 0x45c) 00:15:33 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x141000, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f0000001240)=0x4) ioctl$KDSKBMODE(r1, 0x4b45, &(0x7f0000000100)=0x79a) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000200)={0x0, 0xfb, 0x1015, 0x1, 0x4, "794d4470211af7405ea862f2432f26fa", "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"}, 0x1015, 0x2) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0xf95c, 0x5, 0x2, 0x3, 0x14, 0x3, 0x0, 0xf56, 0x27f2, 0xfff, 0x96, 0x6}) 00:15:35 executing program 0: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockname$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000240)={@multicast2, @multicast2, 0x0}, &(0x7f0000000140)=0xfffffed4) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES16=r2, @ANYBLOB="000126bd7000fedbdf250000000008000100", @ANYRES32=r3, @ANYBLOB="800002003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000400000008000600", @ANYRES32=r5], 0x9c}, 0x1, 0x0, 0x0, 0x800}, 0x4000000) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0xffffffffffffffc6}], 0x1, 0x0) 00:15:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000580)=""/55, 0x37, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/mls\x00', 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x72, 0x4) set_thread_area(&(0x7f0000000080)={0x3f, 0x0, 0x0, 0x0, 0x3, 0xdc, 0x0, 0x0, 0x3}) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) uname(&(0x7f00000001c0)=""/105) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f00000002c0)=0xda8, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 00:15:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0xffffffffffffffda, 0x8}, 0x10) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) inotify_init() read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1}}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) getsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000180)=""/45, &(0x7f00000001c0)=0x2d) 00:15:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r0 = syz_open_procfs(0x0, &(0x7f0000000300)='task\x00') epoll_pwait(r0, &(0x7f0000000340)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x1000, &(0x7f00000003c0)={0x5}, 0x8) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:35 executing program 4: rt_sigprocmask(0x0, &(0x7f0000032ff8)={0xfffffffffffffffe}, 0x0, 0x8) r0 = getpgid(0xffffffffffffffff) prctl$PR_SET_PTRACER(0x59616d61, r0) setrlimit(0x0, &(0x7f0000000000)={0xfffffffffffffffd, 0x6}) r1 = creat(&(0x7f0000000700)='./bus\x00', 0x0) fallocate(r1, 0x0, 0x0, 0xe960) write$binfmt_elf64(r1, &(0x7f0000000040)={{0x7f, 0x45, 0x4c, 0x46, 0xd8, 0x4, 0x3, 0x1d65, 0x0, 0x3, 0x0, 0x2, 0x38f, 0x40, 0x335, 0x0, 0x7fb4a851, 0x38, 0x1, 0x81, 0x3, 0x3}, [{0x0, 0x1, 0x1, 0x5, 0x3ff800000, 0x80, 0x0, 0x9}, {0x7, 0x100000001, 0x7d7, 0x8, 0x3ff, 0x9, 0x7, 0xd1}], "f805a7f04869c9773f7e75b8442c24364fd28f2439bd3628db2f658c1ed4fa9f96eb860c0c2f3ccf264d27b572186841fc34bb725cf93686932c9aa0d347435711779a2138d98d21d6fca24689e0d1a255b6a2f35389d00e25df0828a4c4065941f21e0b57f1fb5408e1aba16d6c2b66f1e2b01082006d5c890148a959247855cc41b9830b4826d7e69625ebc73e971b9abbf3cb7e93b23bfc2a8976", [[]]}, 0x24c) 00:15:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) 00:15:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') syz_open_procfs(0x0, &(0x7f0000000300)='task\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:35 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f0000000040)) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000240)={0xe, 0x9, 0x2, 0x2, 0x1000, "a72c7ccc3d7bf1db78c8693942d75ad55f6e7d2d9dbbb1e1db553b707a21a46570986a0490d8d37ce43bc06610abf9b9f876d3d562eb47f8ec52e11853be6b6bcfa048381f80e74b14ea9f7ce0c982314b79be24e18862d3a1885a4c7388829020172b88240dc7022e67da5c61a884214a92d4b95bdafd8f64245a7a94ee85673510cb084e7acc06e683bc9c5e36d0a85810befae2f4029d46e696f5a215f3c3db7263d6a1e7afeefc554ca883c99faaf6df644cbeca591a64d6d3b4705ec688ea07e5aa5f3f49155ae2464a089a89d4971edc9b1f256470102276dfcb93a605f39ff2bf07ee63756b2eadeae00019754af2c3ca2d2b2e0e718843a8ddee082589f2bb05ff7735e18ac6a3837a0f67a4e0b6388f7be3eb077c66755270cff677fe1a88c8a26d2bc20464c002afbe467c59c8e62d121f75cb818b2c08cfd92339376d2e1801862197cb7c771bd68ae6469b342d660d1a1f7e379bf7acab1d99a87e722e303c49c95f085cfab746aa0e15bdbab7ffcf6764d97ac9891236eec95a1eecd95e992d7d52460717ae0465fdab473e396fcc54d40df9048f148d598bd98a03b22c660d5af380f7f718f610727cc4241cbdfa1a3c7b2fb6d858f1a9a086411bca2c8b56e5f3d557a152472299c2b3747db52e4ab8e426a07d2282eb91b23670ab2569427192b848b282cbcccd83d10d366e0fac8932a3f21d6e4ac9a79304431758278362e683a7a68a91644f19bcdc775397f372bc473ce41df6b52c4d8f6e7bc0909f2ad41bf83df1bb2b4e07e7e7e7c052518500a1f1dc1b55e3904f544e908d54a79108b8f96839ee43010e88a12994fcdd72a0fa5f5c5f0664c68d7318006ae2fef69847a0d4398305f3f917fc9fccebee2aa4b544cc75d8ea0f7ead28bf47d8a2e448143a2f99be2fa8c2d1f2c13b49e02569a5281f6b6c6fd1cc4b8f7758efb49fe8f7988170de108ad652482794b4c9e1fc7bdb446ba179a19394f0ac40cac21d6be20a123a0175cbeb1915d5260689e64a1730d23641cc89cfd37f7ccb30fa509e67e33cdb595394e9c3f56a8d1a6bdfb7794e3e5498be90a8f635e3d755be9b8587f09aa137ea749d73698fd523809ec6bc575b16e857ed3a20a286d793e108cc9f8e87edb77f8ac46c6c0a9ae5f50f3bf792d80884613041a6daa6efaeb6c7f02f4fdbbd1c6f58db421819beb882b60291fca14627f6688a0143a6280c31bffd669de2d76f6e09a644aba77c4ece0572ffbcf345097a7df1139fc4423917b12f0875477c331f6669479355d1674d6e66d44043fe73e168df2f000bc3c26a78f0e61d43f5f552b66c0178f684730f32d683ee442c8d77b80949817964dd7e28ea5875928a15af8e5f4d4bf07ca82e9b97346b1d4828cbd0ead8f2746e5383dc2c512fded69b3e78d00e0dee492004074aa3f7f7ca35e42d1eec7522d19b755e60af706734650b3b54cc12f2def2923acb3b60498c4ad870b5b93e951b2b0973731d5eaaa338821aa1af9e57b4214bc52f6d1cb00ad94931c135179174dc5688c883a915a3d551e5024fdd48b59c37e96be34dbd2587c4035c1e597141411a6939aa388632aa7710256678963e1c7eee063a4bbbd98c9bbb9915bf6b381b79a2216b3caeaf70578165d9fb5f1794be175221e5919c5fc46ebab8d820aa79f95627603d79324174f0f081589507a0350a724f427c4a5abbe0298402e3d88269a77a775728c8328070cf05e84d65520822de2e25eb6a74252e3c870c93c81e8d77afd26305db78d08da2dd9a2ebd4f79ed8155719a4a466c0bc3608566defec0ecffe22467d5dabfba8067140ad79a7c71da3bf3dc08ad069ecf457953bda10ffd1cd54d9a4a0216c389ca8e649ca411548ba4ef94eb70c251ee202b6a87af72e92d13aaf8095d6d33f5b69fa4ace0bc0e0117c1feae6265fadc3732b49d7437bd705c7deef40ffb6176c6ae2f94c1dfe02591064e6e8a98b230c7ec50291f254b8d94c138735916602705205a512e2bb499b343453310a199283f7fea0ece5caf47a1fca3ad0cb7a0b0d3d296d92c2ffbe8230284a129aafef1342881a239603371103219ecb8646225d52c7f31a787dca6366b9d3142b072846fca2b877c03382b5376a11f89db8f76d0dcdefb168df34cf0166278bce1b0bca3e85df028c76ad39f99678f9dfdd90d3c5609d9ed31976fee2751f54c93c90401e179e855c367c94fcd7ef1b83c65ec1b35f5fbeb3ca73188f296c316d2019c7c3efdb81f803ea5ba82c6302ae89360fb0e758a8bb7bc8d240a742dee8b8c206ad97140213f1cbd727ef663b99dbac7ef2a11a730ae02f8d1a60a38cd80b01bb45cca5a9e3553fe833ba987f0a53961ce1fa17274e554b9aa45cb12bd8bd7953f979437a8b6f33742c9e71a85f6a3e90587358646b7c792945e222a710f14bf094413d8f39669a620a9352f1939d0656aca669d2027666dbccc0ca58874fd77e541649aaa49a847e3e51a0e89c3154b7fcee2bf4594565910e41301e3f896474ef18657f46db553896a48a4ecadd1311539effe25333aba151ce3c24b7d275d0f1f2f8b4295ab0ec717ef8475bc63ceed4e46cbf078a196ee3b38f217e679ecf8affe148963ec79958dcd0e94a375de36aafc4d310d02941754cd0c9d36acf3e561ed744a78b69fb18ce04feda80bf43475b00cbd931958b14e87a469586dff4042e7b2b62dcbd8466cf10c4f910a7baa19f86e6cf2c0f8ee182719494293598d39a750e55e126763a24f297ff0808e35e34374f3b6b70af841774a807fd3db1bba25aabe0328241082533125d386db6d38d9d4b8d3bbfaac6e18bfc7cc6a9852baf386c36cb5fb2ff43f65bce89c02973f9392c55ee35c8b28182baf23eb54cb6addb01bf5dbf756b4921fb983a8691ae5cab386f055d8550d0c724eeb9e065a96db285e59a44aed2f089c26ada3fc898e51d6131e3ce27a65483134e841d29918d5c2cf29a3f50c905ac2cea65c4ac9d6ab14a27cafdd90f7068aef446019c6939b24149ce0a12d7ee46a0a7643e94aee3bdaa5e2e8a5c703812ce2b6ad0dd5ae5d05cf245c6926303f3fe0cf448935363ed3ef5d5f53cadc2f07de502d86baa8d117efab987b7ab4485202dda28f6803c33207a2eb3772d8d03db50c10eb68a62465b310742989eea430e83a47c2062d615558c1fbf9ca1abb20b2d5ef3b373793770a0cd13f3555f60965002d39b7f32d686b17255f40fb06fdf0947ddb9a2b773b48b996262573439d21530cf0dc00f12367e3886f5578de032fcd42b2ad2dbebe49ef9675828a3c25ab1e5109d0c034fc50c5c66016f9d590102424883eee29fc20bc661fc79473d2f54933c0a07bd71b562582b4da20913eba64edab3c502ea08157d03947d99bf237c1767552b592c0574e56f6bd10412fe831d35209797a7d6f50f1afbcb687f7e945859a5c1b7a4d7d71ba4ba45e2356255abc3d39334ac737dbd7f4e198ebc4aa542e6331b6f50324f140afd048c1e688afd088f155770eabbe419dc35227bee5c000456018b3e1f8cc68267710930e8955398805ede0178323994166bb270bb2bc5099542fa60069cb04c0585d6f3f4cf95abb725e4412c77d7f88028f2586ed7123b3bfdea06bf200c38e679cbdc31df52e28aa01aab0268f0799f2a9aa03d7b6a9b0eb8602769205ea42e49a4a03f116b7a3c4c446f76805c0f655565f9178ad26bcc8d180ef5b0319f148e0bf22f5e09efe2b7d2bf311321dd9686c404ac263cd07900704b491d72f2647544beaded6c7d10c2edef01afc994325c6ad67dd8c2d5de15a508e9cac336b1505e8bbdf2a171eb231de49772166c7dcfe21f1fd82a58513e448ec44e7b867ebe723db090b6df5f7ccdb09a005936d2eb4b3cb5ccb981a772c301cf0936409a0457f0a7492cdd6f3bd1e820555368e56b74f73decddf6fbe44c1cf75e277631e96c2065bdf420b41264795ac02467f74a1af721dee88c2be35914cb4b3b5f160d2ccda93fe5c8b5ae343547b672a4c7d0bcda5fd65b835550c5703712289d2b3adc95cd9c6f1e0e87efe0c8264452098daa4af041f4f6e97f12db20f8d6400f15c535026f688c1e83f0dc9a8f1293f658b7de17602d17aff1ca192d699a1735146706f1805167b354ec54ea4274db1b18379f7092fe09891412a2eb6e05caf3dfb56bd8b02156c4b0b57704b03cbfaff88d8dd0513ebb89a8a4d346ffad641e76d3ddc55ea2de1d64285ca431520004187da5a9c8081c0ab898d3258f6fb517e6fe49cfc301ea194f2aaa06de14321c0283c6950fa2d29f26e0b9cf4bfa1daed790e75ce9a0a18a2090cf8ab4cd758fc0a5a6d5a8a4373c1372a6c87ecb216c735873721ed76791835443c0bf55179448891b29b9343bca40dc43c21e48ea15d101a56fa37edbd233523db260a64ef8ddbb87b182a5f450f8e7f68d887249d7d081af0a85edac2cddc03f42f8e16679016e241c149a9479f88aaffca6b8090db224e9bd6a52a7c7caaccc722de32931cfb4a4725c2b5010137c558538f6a314cfc876b0dc0d2a45cd838923476d7b1069c8ccf6bb2bedd3dccfab27364f513dbbeabcebea3111636c57d5f668dd33fad27b8ff3f23f2bee8daf716a1733b67548c71b83164518dee897aa72ef13a21172bd7c2282a8d00fbe480474ca04c5826a8e41c946819df5bd0b882bd5b867dd90e6b0bf773201efdebf551df64b4c33f1fe56379c87f3a409c40ca711a59e0cb7a01e302b908eda5485234d070fff2bec3920545696a3779c290ca925773e459ad84f824daa6ac02e40598bd9d6e828550e1145b5a35a16c57242b6a1e06983e2c7a37df312198f75e28b7a7e580773a5cf1753f1dd5032be2dd2667f4b8fe9ca9c74c008eda8088d3ad3eeaabb0e641e657230e17a29e80ff4448bc99af030cf0ab8c8a5d2e6a95898b48209877c80d59edb3c5f373a61d4b95a2a39da35a9f589f21d0901e1133d75854f8080024851e96d104569e270dae289b3eee24ecebce847ae811fce3ce18b830888ba1781c6ee963c43d96d80b5354cc4a189b4be1ff86e92f7f20b369a905277c949c6eeb16ebc1f62555f66082b639660064f54a197a82e4fa882ac4cdcf99c16d6cd750b016fe13215a9ddf4fe9bf161391bf1afa2de20072925ca5855e848a3331615e682253922ff249b50fddb0e595f66a8cdfbe3b9e9ecef6d896c3ab171c35cecec5649b2556aa39ce3c9b34adf85ec5ffcb0e8c0983da7910ef1ffe0bf596150fb600c283ed4cfdb6acaed4484e9b3ec1fa61704e6e5db22cff681ccfe1362c0b26e154ea651ffb46997ebad7360007dff09aaffd6f3b132fc84b600e242d7f7cedf376c6fb0d9bbb009f7b322b9c1c20d066bc93ba57a05fd3067c2ba92071e8733a913abbb659bc07abeca75f3ca715a93d5415821bd4a40605c830402c760a8ccd458d41965778e7086cb550d34995a4152be4e9e43dd1579858aca168b982bbd2abe6358777b43e74fe8bfb8f840328723f28a021568260963560626cb867fe17c14a1951ee2d5d071bdf10b00a70ca731ac7b24ef035aa60bd149a583589724337041ed90e93196135c670fd0148d0a967542e44508220706ba4acea1c8991d154f574ba543ba1bab1557fdaefc294ae249c2a9a4fe2bb456c72b6d1208ea20ebdcb830fc909512ad23bd57a7559855ec0860bfe175a6e5026a057ad3a63d066daccd27366f50cefb254c722ca294339f404a17b966f683e8a26e312de0278f474d33658d7"}, 0x100c) r1 = accept4$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e, 0x80000) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f00000001c0)) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x50, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) ioctl$BLKTRACESTART(r2, 0x1274, 0x0) r3 = creat(&(0x7f0000000200)='./file0/bus\x00', 0x0) fcntl$lock(r3, 0x7, &(0x7f0000027000)={0x1}) fallocate(r1, 0x2, 0x80000001, 0x4) write$P9_RREADLINK(r2, &(0x7f0000000080)={0x14, 0x17, 0x1, {0xb, './file0/bus'}}, 0x14) 00:15:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) 00:15:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x4080, 0x0) mknodat(r1, &(0x7f00000005c0)='./file0\x00', 0x8000, 0x6) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGSKNS(r2, 0x894c, &(0x7f0000000040)=0x1) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) setitimer(0x3, &(0x7f00000002c0)={{0x77359400}, {0x77359400}}, &(0x7f0000000340)) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) r3 = geteuid() fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x100020, &(0x7f0000000480)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, r3}, 0x2c, {'group_id', 0x3d, r4}, 0x2c, {[{@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@smackfsroot={'smackfsroot'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'user_id'}}, {@obj_role={'obj_role', 0x3d, '@$vboxnet1trusted$ppp0'}}, {@fsname={'fsname', 0x3d, ')mime_type\'-@-wlan0-'}}]}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 920.103171] audit_printk_skb: 3 callbacks suppressed 00:15:35 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$netlink(0x10, 0x3, 0xf) r2 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f00000004c0)=0x1e, 0x4) dup3(r2, r1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000000080)={@dev, 0x2}, 0x20) [ 920.103185] audit: type=1400 audit(1560471335.450:5625): avc: denied { create } for pid=19924 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 920.320666] audit: type=1400 audit(1560471335.680:5626): avc: denied { write } for pid=19924 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 920.794316] audit: type=1400 audit(1560471336.150:5627): avc: denied { read } for pid=19924 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) [ 920.846512] audit: type=1400 audit(1560471336.210:5628): avc: denied { create } for pid=19924 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 920.848796] audit: type=1400 audit(1560471336.210:5629): avc: denied { write } for pid=19924 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:36 executing program 0: r0 = open(&(0x7f00000001c0)='./file0\x00', 0x8040, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="c0dca5055e0bcfec7be070") clone(0x20042100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fsetxattr$security_ima(r1, &(0x7f0000000080)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="040046c31d0196ad9a08f9b9c5fe9ce47008a578c6c1a3097fce"], 0xd, 0x2) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)) 00:15:36 executing program 3: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1, 0x8031, 0xffffffffffffffff, 0xffffffffffffffff) getrandom(&(0x7f0000000080)=""/44, 0xffffffffffffffea, 0x0) r0 = memfd_create(&(0x7f0000000040)='u', 0x0) r1 = dup(r0) clone(0x1000000004001, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execveat(r1, &(0x7f00000000c0)='\x00', &(0x7f0000000140), 0x0, 0x1000) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) openat(r1, &(0x7f0000000100)='./file0\x00', 0x642002, 0x1) 00:15:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200, 0x0) ioctl$BLKPBSZGET(r0, 0x127b, &(0x7f0000000040)) ioctl$RNDCLEARPOOL(r0, 0x5206, &(0x7f0000000080)=0x80) fcntl$setflags(r0, 0x2, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'veth1\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000100)={@dev={0xfe, 0x80, [], 0x15}, r1}, 0x14) r2 = socket$packet(0x11, 0x2, 0x300) write$P9_RLOCK(r0, &(0x7f0000000140)={0x8, 0x35, 0x1, 0x3}, 0x8) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getegid() chown(&(0x7f0000000180)='./file0\x00', r3, r4) sendto$packet(r2, &(0x7f0000000280)="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", 0x1000, 0x800, &(0x7f0000001280)={0x11, 0x0, r1, 0x1, 0x4a2e, 0x6, @random="bc05abbbd1fa"}, 0x14) renameat(r0, &(0x7f00000012c0)='./file0\x00', r0, &(0x7f0000001300)='./file0\x00') ioctl$PPPIOCSNPMODE(r0, 0x4008744b, &(0x7f0000001340)={0x7f, 0x3}) fchmod(r0, 0x100) r5 = syz_genetlink_get_family_id$net_dm(&(0x7f00000013c0)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000001480)={&(0x7f0000001380)={0x10, 0x0, 0x0, 0x60000004}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)={0x14, r5, 0x104, 0x70bd2d, 0x25dfdbfb, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000010}, 0x40800) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001500)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000001640)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001600)={&(0x7f0000001540)={0xc0, r6, 0x400, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x2}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffffffffffffb}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x20}}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x622d}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e20}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x60}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0x10}, 0x4000) getsockopt$packet_buf(r0, 0x107, 0x0, &(0x7f0000001680)=""/55, &(0x7f00000016c0)=0x37) r7 = syz_genetlink_get_family_id$fou(&(0x7f0000001740)='fou\x00') sendmsg$FOU_CMD_ADD(r0, &(0x7f0000001800)={&(0x7f0000001700)={0x10, 0x0, 0x0, 0x408}, 0xc, &(0x7f00000017c0)={&(0x7f0000001780)={0x1c, r7, 0x200, 0x70bd2c, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x800) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001840)={@dev={0xfe, 0x80, [], 0x10}, @dev={0xfe, 0x80, [], 0x1a}, @mcast2, 0x7, 0x8, 0x0, 0x400, 0xfffffffffffffff7, 0x2, r1}) openat$ion(0xffffffffffffff9c, &(0x7f00000018c0)='/dev/ion\x00', 0x1a1000, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f0000001900)={0x0, 0xfffffffffffffff7, [0x5, 0x5, 0xf85, 0x101, 0xfff], 0x53}) tee(r2, r2, 0x8, 0x2) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000001940)={{0xffffffffffffffff, 0x0, 0xad63, 0x1}}) r8 = add_key$keyring(&(0x7f0000001980)='keyring\x00', &(0x7f00000019c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffff8) r9 = add_key$keyring(&(0x7f0000001a80)='keyring\x00', &(0x7f0000001ac0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$search(0xa, r8, &(0x7f0000001a00)='asymmetric\x00', &(0x7f0000001a40)={'syz', 0x2}, r9) 00:15:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000340), &(0x7f00000003c0)=0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id', 0x3d, r1}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x77, 0x64, 0x0, 0x31, 0x61, 0x35, 0x7f], 0x2d, [0x39, 0x61, 0x35, 0x36], 0x2d, [0x30, 0x63, 0x7d, 0x3f], 0x2d, [0x66, 0x35, 0x77, 0x62], 0x2d, [0x67, 0x63, 0x36, 0x66, 0x73, 0x7c, 0x30]}}}]}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) 00:15:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x2, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000240)={{0xa, 0x4e21, 0x1, @local, 0x6}, {0xa, 0x4e22, 0x10001, @mcast2, 0xe3}, 0xe988, [0x667a, 0x5, 0x1ff, 0x8, 0x3, 0xade, 0x9, 0x100000000]}, 0x5c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) open$dir(&(0x7f0000000040)='./file0\x00', 0x80, 0x6) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 921.788522] audit: type=1400 audit(1560471337.150:5630): avc: denied { create } for pid=19969 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:37 executing program 0: r0 = socket(0x10, 0x803, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) write$selinux_create(r1, &(0x7f00000000c0)=@access={'system_u:object_r:selinux_config_t:s0', 0x20, '/usr/sbin/cups-browsed', 0x20, 0x9}, 0x52) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='security.SMACK64EXEC\x00', &(0x7f0000000180)='system_u:object_r:selinux_config_t:s0', 0x25, 0x3) sendto(r0, &(0x7f0000000080)="120000001100e7efc08b0000f4aff9030a7c", 0x12, 0x0, 0x0, 0x0) [ 921.853940] EXT4-fs warning (device sda1): ext4_group_add:1612: No reserved GDT blocks, can't resize [ 921.887232] audit: type=1400 audit(1560471337.250:5631): avc: denied { create } for pid=19969 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 921.889475] audit: type=1400 audit(1560471337.250:5632): avc: denied { write } for pid=19969 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) [ 921.929964] audit: type=1400 audit(1560471337.290:5633): avc: denied { create } for pid=19969 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 921.932239] audit: type=1400 audit(1560471337.290:5634): avc: denied { write } for pid=19969 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) 00:15:38 executing program 4: r0 = socket(0x40000000002, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0xfcda) recvfrom$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, &(0x7f0000000d00)=@abs={0x0, 0x0, 0x10000e0}, 0x6e) setsockopt$inet_int(r0, 0x0, 0x1d, &(0x7f00000001c0)=0x2, 0x4) recvfrom$inet(r0, &(0x7f0000000080)=""/251, 0xfb, 0x2160, &(0x7f0000000000)={0x2, 0x4e20, @rand_addr=0x3f}, 0x10) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000180)) 00:15:38 executing program 0: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r0, 0x80045200, &(0x7f00000002c0)) r1 = syz_open_dev$binder(&(0x7f0000000400)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r3 = getpgrp(0xffffffffffffffff) get_robust_list(r3, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x8, 0x0, &(0x7f0000000300)=ANY=[@ANYPTR=&(0x7f0000000240)=ANY=[@ANYBLOB='\x00'/24]], 0x0, 0x0, 0x0}) pwrite64(r1, &(0x7f00000001c0)="fbb1f8dee5816bff9ace575f1e10dc3ff0bd47fbab5c634efddd480f5b3834541089d3938dec0a91f0fa753a0da942dce10dadfa7e1a4cb2d265776da3aa5e57e6c80bd756e2cc6b91c90be7df7c2c81d880962db65a27335cc8c58d639d08fb75faaa", 0x63, 0x0) [ 923.617925] binder: 20011:20013 unknown command 536871488 [ 923.646697] binder: 20011:20013 ioctl c0306201 20000440 returned -22 [ 923.747457] binder: BINDER_SET_CONTEXT_MGR already set [ 923.752792] binder: 20011:20013 ioctl 40046207 0 returned -16 [ 923.770942] binder: 20011:20015 unknown command 536871488 [ 923.770952] binder: 20011:20015 ioctl c0306201 20000440 returned -22 00:15:39 executing program 3: r0 = socket(0xa, 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000340)={'veth0_to_bond\x00', {0x2, 0x4e20, @multicast1}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2d, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x108) r2 = request_key(&(0x7f0000000140)='id_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='vmnet0/-\x1b{loGPL-(*ppp1\'#eth1^user\xa1user\x00', 0xfffffffffffffffd) keyctl$setperm(0x5, r2, 0x401) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x2d, &(0x7f00000003c0)={0xe7, {{0xa, 0x4e22, 0xffffffff, @dev={0xfe, 0x80, [], 0x29}, 0x2}}}, 0x88) 00:15:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = socket$nl_route(0x10, 0x3, 0x0) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) fsetxattr$security_smack_transmute(r1, &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x2) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000280)=[0x100000000, 0x3e]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000240)) 00:15:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) 00:15:39 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x100000890e, &(0x7f0000000140)="055e0bcfec7be070") creat(&(0x7f0000000040)='./file0\x00', 0x80) r1 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) write$selinux_user(r1, &(0x7f0000000080)={'system_u:object_r:anacron_exec_t:s0', 0x20, 'root\x00'}, 0x29) 00:15:39 executing program 4: syz_open_procfs(0x0, &(0x7f0000000000)='mountinfo\x00') r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000640)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) syz_open_pts(r0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000040)={'veth0\x00', {0x2, 0x4e20, @broadcast}}) socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 00:15:39 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:40 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/mls\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000180)={0x80000001}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:40 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="c0dca5055e0bcfec7be070") setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f0000000000)={0x2, 'nlmon0\x00'}, 0x18) clock_adjtime(0x0, &(0x7f0000000440)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x20000400, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000140)={'erspan0\x00', 0x401}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000100)={@mcast1, 0x1c, r2}) 00:15:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:40 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f00000001c0)=""/203) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x0, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20000) r2 = dup3(r1, r1, 0x80000) ioctl$EVIOCGPROP(r2, 0xc004743e, &(0x7f0000000640)=""/246) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x0, 0x0) signalfd(r1, &(0x7f0000000040)={0x1f}, 0x8) ioctl$EVIOCGPROP(r3, 0x4004743d, &(0x7f0000000440)=""/246) signalfd(r1, &(0x7f00000000c0)={0x1ff}, 0x8) 00:15:40 executing program 4: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x200100, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000080)=0x4, 0x4) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000000)={0x743}, &(0x7f0000000180), &(0x7f00000000c0)={0x0, 0x1c9c380}, 0x2c) 00:15:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0x0, 0x5, {0x7, 0x1f, 0x8, 0x200000, 0x3f, 0x3, 0x0, 0x80000000000000}}, 0x50) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x1, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x38, 0x1, 0x8, 0x0, 0xd9, 0x1058, 0x2, 0x1, 0x9000000000, 0xffff, 0x3, 0x2, 0x1, 0x7, 0xffffffffffff7eae, 0x3, 0xffffffff, 0x80000001, 0x4, 0xcc, 0x0, 0x3f12, 0x0, 0x8, 0x8, 0x0, 0x10, 0x7, 0x7, 0x9ba, 0x4, 0x800, 0x80000001, 0x100, 0x43dd, 0x0, 0x0, 0x0, @perf_config_ext={0x800, 0xe3bc}, 0x2, 0x3, 0x7, 0xe, 0x0, 0x6, 0x7}, 0x0, 0x1, r1, 0x3) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:41 executing program 0: lstat(&(0x7f0000000240)='./file0\x00', 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) r2 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNGETVNETHDRSZ(0xffffffffffffffff, 0x800454d7, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$TIOCGWINSZ(r2, 0x5413, 0x0) getuid() quotactl(0x1, &(0x7f0000000400)='./file0\x00', 0x0, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000300)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) mount$bpf(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x40, &(0x7f0000000680)=ANY=[@ANYBLOB="9c73de54d980eb9c6e77f947d068dd7ecd691bd77a6ac619e60e20d48fa123a8ef7ff32233bdb11715bedf0337ff2a51256b1a57df7be3af18783275312db0a155b6c30e65809c363be4f409f557f574878246829fafac1bc53ab22bef9f92cc787af867a6f604470a4a686c286276a78afc86486254c4b52a05f6f47695790d82f9bdf91fb3578778356f2a5e9b27e42faa13f370d56fbf3228974f09abc6c4f6e13facbc085fcb18e2e9a8aded6d492f922c465c8362cc77640b750ab86262fb93"]) r4 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) getsockopt$sock_int(r3, 0x1, 0x0, 0x0, &(0x7f00000002c0)) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r4) ioctl$TIOCGWINSZ(r0, 0x5413, &(0x7f0000000000)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) fallocate(r1, 0x11, 0x0, 0x100000001) recvfrom$unix(r2, &(0x7f00000005c0)=""/159, 0x9f, 0x100, 0x0, 0x0) 00:15:41 executing program 4: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0xfffffffffffffffe, 0x100000000000001, 0x2}) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) rt_sigqueueinfo(r0, 0x7, &(0x7f0000000180)={0x0, 0x0, 0xffffffff}) ptrace(0x11, r0) ptrace$poke(0x4209, r0, &(0x7f0000000000), 0x0) 00:15:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:41 executing program 3: r0 = socket(0x10, 0x803, 0x0) write(r0, &(0x7f0000000000)="1b0000001900070700000000090007000a000100fe800000000000", 0x1b) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000040)={'ip6tnl0\x00', {0x2, 0x4e22}}) 00:15:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:42 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x801, 0x0) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000000)={0x0, {0x1}}) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) write$uinput_user_dev(r0, &(0x7f00000006c0)={'syz0\x00', {}, 0x0, [], [], [0x3]}, 0x45c) ioctl$UI_DEV_CREATE(r0, 0x5501) prctl$PR_GET_SECCOMP(0x15) write$uinput_user_dev(r0, &(0x7f0000000b40)={'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\xfb\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\xfa\xff\xff\xff\x00'}, 0x45c) 00:15:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:42 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) getuid() ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, 0x0) mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r2 = memfd_create(&(0x7f0000000080)='\xfaIhFlK\x99F\x17\x16\xa5>\xd3\xc0\x93\xb5.\xda\x06_bT\x1cB\xdb\xf8y1\xe7,\x03\x98h\x86(\xa0m\x87+x\x14i\x88\xcd\x89\x81\xfb\x86', 0x0) getsockopt$sock_int(0xffffffffffffffff, 0x1, 0x2f, &(0x7f0000000280), 0x0) pwritev(r2, &(0x7f0000f50f90)=[{&(0x7f00000000c0)='S', 0x1}], 0x1, 0x4081003) write$binfmt_elf64(r2, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x86b) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r1) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) socket$inet(0x2, 0xa, 0x200) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x21000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r3, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff7}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x565813d1531ce006}, 0x20000000) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="62927266732e776c616e202300"], &(0x7f0000000100)='/dev/loop#\x00', 0xb, 0x1) getuid() fallocate(r1, 0x11, 0x0, 0x100000001) quotactl(0x201080000100, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x80000, 0x0) 00:15:42 executing program 0: mkdir(&(0x7f0000000140)='./file0\x00', 0x0) unshare(0x40600) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x2000000) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/status\x00', 0x0, 0x0) r4 = accept(0xffffffffffffff9c, 0x0, &(0x7f00000003c0)) r5 = dup2(r0, r0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r7 = openat$null(0xffffffffffffff9c, &(0x7f0000000440)='/dev/null\x00', 0x40800, 0x0) r8 = syz_open_procfs(0x0, &(0x7f0000000480)='status\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000580)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x12000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x54, r2, 0x201, 0x70bd2a, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x34, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}]}, 0x54}, 0x1, 0x0, 0x0, 0x11}, 0x4040000) socketpair(0x17, 0x8080f, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x1, 0x0) ioctl$KDGKBSENT(r10, 0x4b48, &(0x7f0000000280)={0x0, 0x0, 0x4}) recvfrom$unix(r9, &(0x7f0000000180)=""/222, 0xde, 0x10100, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 00:15:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/sctp\x00') ioctl$BLKSECDISCARD(r1, 0x127d, &(0x7f00000001c0)=0x7) sendmmsg$inet(r0, &(0x7f00000009c0)=[{{&(0x7f0000000140)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10, 0x0}}, {{&(0x7f0000000600)={0x2, 0x4e24, @multicast2}, 0x10, 0x0, 0x331, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x10}}], 0x2, 0x0) 00:15:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 927.769776] audit_printk_skb: 27 callbacks suppressed [ 927.769790] audit: type=1400 audit(1560471343.130:5644): avc: denied { create } for pid=20102 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 927.857135] audit: type=1400 audit(1560471343.210:5645): avc: denied { create } for pid=20107 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:43 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000080)=0x5, 0x4) getpeername$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0}, &(0x7f0000000240)=0x14) accept(r1, &(0x7f0000000280)=@hci={0x1f, 0x0}, &(0x7f0000000300)=0x80) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000e00)=0x14) sendmmsg$inet(r1, &(0x7f0000000e80)=[{{&(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0x10, &(0x7f0000000140)=[{&(0x7f0000000100)="72ef93055b129ecf86d7bc0a", 0xc}], 0x1, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @dev={0xac, 0x14, 0x14, 0x20}}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @rand_addr=0xffff, @local}}}], 0x58}}, {{&(0x7f00000003c0)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000400)="e0b01a5a435bc22a989888c6b4a388deebc83b30569ccb3f849899031e3018014bb3a195486648ce4b48819010b230b267539da386bd770c414153aa808177d6517071d23f8b66dfcf9d5c5d4f13659c1071b6927e5c5d4389fa21918439720f623613731e0fe22df9ba0c35901feefbf5d84855f3b85f09fe591a73d893d3a5516db34dba48fbd6d35e4ef619ed7fc6f5d1a6e31c9fb510bb76cb8012308e8d1d39a80ebb3e0be4ce3e505a50eed263fb76d1cc5693728db0c8dd8ecd37c5073b67cb9e88e6dfaf775e38", 0xcb}, {&(0x7f0000000500)="3f001b8a2ab0684486948bae971e2b9b37aa9b919acb9fdaae7fb1ac6acaa9fb17d1097f8e05a11f1bd1cfb1462e61d610aed97196a62e5961559b29b025768e271685d0b69294473c14668e9e50d093c5c6d211d9a0a6d8dfcf285f98191dfd0e4f45610fe0de2dca22b59e6c2ba96512a412a7b68c3e3b3e4e7c50b757d7442066b9f8c0f16809978a00cd6277328e1353e9843e046ff4fe454cfbedd57f9e458c3cca60d9b02a750d50e5c777d2fc95a4f65b1f", 0xb5}, {&(0x7f00000005c0)="32ba20adbce5bea2b5efd3d362258a6940fb9950d7d531bde11e8e3ceeeed6b6273f82db72596ca4e6ab", 0x2a}, {&(0x7f0000000600)="05dbc32935e83838675234f2db95a8c039c9666a535fd0c58956059a4092e40d38ccab662160184d0d92e469b9a7976294d6b94d71b015c6ca0fef493ee3282ecc52e9246fae50176ce9655c393e507f9b7890b3202de14f16b438921ad69bf0a95cb27ef5457636b7a7f9b724929e2901fd0c3fefeaa0e895498793996a76189f6767ec7337c3040487b9249213c951a791dd8ffbee47473d20744058decc4601801e1bec57d0dc", 0xa8}, {&(0x7f00000006c0)="0f0016d452044c2b342f228994161abb6c", 0x11}, {&(0x7f00000011c0)="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", 0x1000}], 0x6, &(0x7f0000000780)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x2}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x401}}], 0x30}}, {{&(0x7f00000007c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10, &(0x7f0000000800)}}, {{&(0x7f0000000840)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f00000008c0)=[{&(0x7f0000000880)="f5727fc42e0d29546b7afd140d05749839490799bacd2c34bddd93b0f90c3a228a1b8bfd6937668cd7a96d3d031a5a", 0x2f}], 0x1, &(0x7f0000000900)=[@ip_retopts={{0x18, 0x0, 0x7, {[@ra={0x94, 0x6, 0x6}, @end]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0xe0f}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xfffffffffffff016}}], 0x48}}, {{&(0x7f0000000980)={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000000d40)=[{&(0x7f00000009c0)="33ad26a260f3fadce90ee789b9b7d1bbec89fc2a2cd2c9202fb9f682fdede507c2b20f93bb9cc6cc1edb0ab02ae373c0b6b4af76cc1e561cb961d7c6eb967be8071e35b5a04873b684375b9332c39a27f5938157edf0ef7e19f14d88240d4d178529438cb4f4fc169335117190a75d996f51064af72374e9b9c6ad55858cf8eb3d85ee5793e33707ff5a9cadb3ebd6f0949d09b43c985b48afaf84080ec6f4acaf34377067640daef35226dd6f60f89876477d7ebd80f20374ca3a749797723c54227d9b", 0xc4}, {&(0x7f0000000ac0)="f5a7749bed403fce1e4a9bede8173df8f6cb2ef3dce41ba2847aada2a6ae1a7dda4ff02d04851ea04e1f305234b1a22af37b0360f3dfe09dd3b468d91361433cfb77cf801e3eae14f6321fb10085af7cc9439c37e36d06ebc0a1", 0x5a}, {&(0x7f0000000b40)="ed4cca27ca067ee81e7297bfeaa889f1c23760be2f2fde12dcb4b5dd99de053d296bfa1a7d0c5008c15f1b0da4c8a8c37c69c445253cf511202b288cc5ba82ec0ba3752a664bdf295ffd166bb36326462c636dfa942e9dedb0bb3cf6c6379293d66e5a99dad075e8a9b9b4f6cbe535d89e7d32fea6a771811506585cdde43366d195f3e952296b6cd9bc713303ed8f23a1bbeac8fb117b129d4dc063421113cc69947f33c23212f824abaf4d742dbfce28859514da3b138e1dc31cd0aded9281a3f43a", 0xc3}, {&(0x7f0000000c40)="8b49730b03ddc3bde49490256e77113be52245e48fe19af2519092e1979c7340326e1c344c18d1c876df87fa7c8503118a4e4a736cf289e219bd3aa83a975541066f49fade952dde46911de5355761c91677fb01f4c5f384b4109f2f29ce0a4cbda3c2192a9a66f71ef32a1566dd99282ae878de244fbacb6b08b67746ad540cc5afc8f1e71416c2e5afbed5c4a4e45dcddc164504d81dc2f6e1e2f32f8bd69fdfc7d0237cf2ab76ae5eb22d8a13fbb197617f25", 0xb4}, {&(0x7f0000000d00)="019bd5201134b736023ba444b02e4eef5f3b2156c1", 0x15}, {&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="a0e63e4aa6326be492299c1593be1722188ea544e18e6ac43fbad0f9ee1933e9a9ec91d57090025fa1b4e92b6dae18d48648fe917700fac07572be332b5e3d6ab7604f390e1843cf9e700a1c2c0bb766116140089a71f3d2d58210bf179183ec70093637daaa6ec3a5b35ead09ac214da8053d9d14a1103b19c3c44b1a56f5d48610c2634c1939140d223842ed90088c8a77cc7da339da8a1b8651d76178f1444431899b372a8650d0884ac56634d1aee8013f14cc336db304a4299c4c7de4c5a5d16166bf0e1258bd3c8207c73bf558b67f956f64f0dcee239e675817ed06ad7f6a25c64a5074e8b39e1a1f0351f5d728a225b0541b192b2210fdc49feeccd74a435ec588b9973cbb04ffbce7faac40e5dadd582e3896147c5b816bf54634147f752ce9eb176c8a7483eb0f08aa6e429b338dd595ff77836917f41fa7bd3dc49ead116ee5a96767c6e541be40db8216eac8e5e272707ff081842c5919fe8917534be0389d3553c79517ef1b735d12fb8df3c05ee1ba717128fc2bc320f473845a2f44b5415183fc2d500f27191c2719ac3502d70a346219f84817ec11fc7fe965ddeede9c0d9adc38b738f43c3782738ac6e6b75a7470c74e0f20f6c0f95a9322741863051b9a33cd116ee778791985584dbede9ffe3fc21e85e5cb9a3a1a617705dd3da4f305e4ad1c48e87e9260272a0e865dfb392db48db0276d69e361d99fbb3ebc225b1c6e19ff78f791cb68d4ca7bd4103394a5df0e97c81f2107ef041724380b927e9f47b9e7b329b40e1396f27c7d37b3a57efa4a7d76f951633e0ace7e0317133f6036573c9f615ba4ff43a71f4c08b3857456bbc887d3e2df0523fc29128b14dd55111a1d9abf183020a1a5f88fc2c708f992816610de35a746bbe81ec930efe31913251128987238c9facc59c0bbb53c12f86fec843a865786de79fb6f10ef4d040089036444f8c963914aa6e688508fdf6f5e48774f86c024f27dc1fec161c938157aadbc29a2e14702985f112c041557b4f6925c883d6e4d9f951bb00af8d9124ce456c7d25ca3c6a4d8438380777f7d216bfff4aa6170d7a459b3a9bd888189fe3dd8758da23a9149dadecf0bf0900e2013429bc57575900da52be1941e45ec621b919f8f5b165fa583ad949dfc6f6cc3e5203fcb17babc93011742c888288e3299659d7a4a473a67acf42f57332d6a834654013e50277b498705e4d5c24ac2305bba856fcd8f1feafed98240c4aaf1d26d9b8990064d44a017d1e27ad934926e166d751989a4e9e2ef75f45f306667832a1930cf56affd67a7dec7a6641ca3d8deb1aac515086d71a65edde1816e3d8585b65d7d4381e0b6dc2bdf83bea35775874e63eaac99bcb2e63d20e07bd33b6012a670dd1e1666a131dd14537e8712840406ba76a56487f9d598f2ba3f5af20b95fc43d9cfdc8c2c82c6221f8e115bb5d9a3f431e1e4e4626b406a0432f848d80d5dce3586fccdb4bdf342d5268ac3dc32812a143f8efbe95b640a81925e080be8015c3ac97577d7ab61ea399002531ae02e09bd5e77e2e6a187743e02b5dd1ce2c0d3065dab20da23ebb151b24f9c8382bf4c920ab8fc46c55b161869672ad1c723daa676bc94370e36e514bf64f2aab920c43e9e19e3361c9409961f582eddeb8c66c77cc8aeb860f28d089f919dbfc0ca7b8c7455f3a486f4e67b2cd9735ea166848da41b2b6a9bb8eaf2bed78057a3207575ae632385af6ceda78bb736d8db972d9892f254a4d1af6e0fc395e660713a3ee316e71033fbf298ca8f90808270894040ce2c4200f544a8e208435b7c0ef9413ca2336ed6d2684f72af6e81b9fd50f27bf106d661236902ccce6a0ec385ca877117cdfe6613cf2047ea7d3fba6e8f0a67828d2e91040b6f025ba5aaec62b0d4b9dd8f1a501b2ee162b80e23bf1ad4d86b2e351b3b9a4a45fdbf8cb31af4574d7540eff5fbb9f3f6a1e2c170afc61e85c1089ac6a271a6ef355e56ca466267b336bdd66217e5a3d3e2832c27d8cbf8ecdcf85aade54e5f5d91bfae8ac8428906b00eb7305aac9049c0360914e313c108cbb4ef9f7aaa6bc9a8c5ee09cf1927d5521cc40529441df9af9dafa9edf22cb07cc2f2033b5792e6c7db1e254c4551b0b63d7cd44319c50f9e762b19107aa20a9593144fb711c299fde732695f331b4e56483c9ee95fd3252a5146c9e1326b7784bd82ea4a01b2ec0d1606e40808613b9e14adb8bc9f44497d9f09ca2069f6a7a6887d6f304328229ecefd0243c02906afcb09870329f7c6ae5d4eb03fe8a589a4956abc9c163d4e707313c3fc620e05b94f1297877c044f77f50864c078c38dd4720ea3b3eefbc81c2ca69da330f032c450038421067c2882936662b247bfa27cab35ad0e78cfdc64e4d7470806d5b64b53da414e6dc39d5f469cca6d881590645c2f9153455de1fc10d28c96a35f531383b03664d6c1833210efc0d1f3f4cd4c0fb1fb14602931b8138f5a630eb76a4f96a62820d06128061f0afb11d9ac182d7eeb343536a7ceae2f13ead9daf52e7eea86b8d5acf83dc5d65a910bc6b8a8f27173a639a14ac5e301d19d6c01a8e025e8e1089ab6ef5978c44cdec0a035facd906851896c0d540d1385693b5ba8d9be8e99b06a23dcf3b22e4f7f73cd0169d4db0e0a7c48d2d9cff2b9cabe392ae12bd703408e0566b0fddef4cdc14c5489f7c02674bbf07ed01de203ccea8bff35a5a27075b7820f42b3996b600c323b57b4517e95892d757f83273d53c4621c787f0cc685c83c5a329472079661ddde40e4806f16db99b2c05cebfab6bec4d68bd053522a4a473bffc4be818253b428215cae4952a70ac6f6e289da362339a62a8a2371c9e0b7340bb5e43b68255bfb9463a9438c767f2df2e7b4aad23e9ae05c27e4ae45e1c57f6804b844f7fe9ae3c0e26e8901634175a003b4e02aab329c0ac5b7779dea569bf96393abbf9099b224a318ec1d5f2c9db63496ea99241151eb374965ac6b4f7cacca392c96e3de653d6cd2dd51c22dbcd9dae498afb38e1b58b2107af76a4f6efc2a15bc9bfd29b1ae9fadc24e4240f173c603c2fcd52387f29da479e213ff3afb6f26ad2436e132a6bd2211a1b8e0a5ad11b09baf213638ea23bed882be80f424dcd2d87d3c6aebc00ee9c8639b068acaa5a73604f86fe29890f718f692dfe82ab56550bb2e8152aafddff705194610582b6a5c24b243e7ec725f326b592433488948eb8c7de2db22d6bfd07f42b09398ef8c2c436efb1246e73eeb91f9391c8c39847e175b532a44b95676028b3ea77c79d745db9a5eeef64492a4edd724c4a8b0f375b11d9fffe81976b38bfd1487540df3ee0ece480401ba4a400cedc154a4d63e92fb72d02a7e6a227e9be2131d2adcde240671d90ce428f38bb2fdba6b82b03576a3756b360eca26b7b399b51552fefcb3299ca60ad69681b65c0531996a3813e2829d0a1d558306f6024f2054480ff590e97fdebaf13457d37cc495d357dc61300e7c239f0dc632c855cb9059c317969c96b7664b1798122a566801b788a99975f8514df8da59b66bd3e710b0060db9313a462eb6f74c6e54ae872888c3f197ca6856ee9b9b3ef1f5bb98cfa3b76fc79bafef9a5b5b2e9c4499bc9ce2280bf7238d204d3cf7c65755c62bacfa7978333a3ddc31dffb980b80c049c73e6b3afa599890c2804aa48ee54cf89d1aa7318b2998ebc3ca8a0b8b3f9443311f3c39485b146ac9dc68abfed6b78c1ab33c598011d095522d516318685f60627b21e320d522a15499ee52b2f4eef3725b6f37915f21d51276fbc541c3a20935ae78e5aabc44c24fcaaeee829e1688a3e7ce0122ac0694eef6559ee9b26152cbcd1f813c8b74c7e51c27c411a896aa816ead3c7411e39d977b511d402a33a4398d84d8d3319ac06814ebc45a606c975a757d8b6c964a1bd93f967ed2997ed3220c202dbadd671b79d4741a5e0f0d8f2dd59a748d46ec9e8fd8be591773b33b8cf37f894745d71adb5a6a44f7ffe0a0476788d041fc1cfc03e5cceedf4ee7a614d7afdec8ee69be2edcdcdb8f109907591f69d5961e0cdb77aff2aad7f93f702be6a4ef1d17a77bc6e6a049dc0b8145d7ca0fc9658cca0f7d10c4a69690d0f1a8a7ecc0d8986c24c097e6a7d91af49e08def4f928fc7081904bdd81f6a0cc12b81a0c63ac437cc1d4fa907179ccc1b69189bb6bd3b98a8cc75085f82f8f8cd7dd47bd0d931d1fd7bf6c60781c8494756ff6aafda643fc4dd3c9451b4fc4a55016041fe2b217864ed3a64577d5f4c4e8ba8b8c808bfcce40cb3faa6d7bb7659e31c4ad916eef3455392ec39c75d4e89f286a1c15bda35d46d66a09cbeddbd4a26285b2fba49cc30f3e9c9ff1226c3f44954f0b1626defd3e66f2f37c6f4d68e257d01122453a4d69f5dd3e835ab236f8571ae469100335977525294a2f3e98c28f1d1100a0ff75fa7613eee39f93910e13e3556c8bcd0741d621153c8e76c81e28ffd607edf2ac174b74d71cfb5dbb7ceb222020fb15759d03bb2ff2289a64bbdc7419ef52c08c3301daf06c6643986a2d5f4c978c452e408b5e061bb10d10f3d6cec304c6e72454692ffc84cfe71ba68a1aa03e1e64b3720510cf79e17ce5f6f091d9cad3c9e451e6c11bf7103db818ab863cb042d4ed98c5cf6b863b77fdfa973271363cd0bf1d0b792e2d0c913f0885ffc6d03e7583224b8eccac4ed727b46d47ec58a1316a4262fe2e1a738486561110c1270d873a5a8b90bae01c561178d21928de47c09f655251b74ddcdbe5c257d55b7db98f5526a88c5c111dd886580577489e46771fae6cea3f875a3dcdc6982a919f478c9e05d2356d055753ce1d02936c9db163e7e29b40660c3c6f160f85b0cf180309efb0fd1863b66ae304d0539b01e80f65d4a37adf96bf02c2a1bddb464aaf0e5e9c03e3f485c865a5b3c450d14f6aaf34c0f5272ba8e2263252e7bde598289090f7a1642ed693149fd8c44e77db79d78b887409ebb8a893d51aedd5e58a01c7434a749dc4431297dc507132b7e9e9f4bf95c1935541e453fc2d8f83529d45efc75d876e91725ebc98681d50430d59ee5d4c428eac07e930e34c96aa1744929b9e7e3e0ba8197ddf19d49c5b31f3743e93d60e01d1078fd4e03ecb045e9ab3db15016aa5fdbf3205427a17870566ca6cede58f546b28d1e50678aec3218d0542a4bef51875b52d632fdf2f4b4a26363c0a9cdda272278f729697646d0da9927baea14dd48fbcd55aa4516edf97d215525072e58e3c9cbd69a0db5cea370411ec44fc4ac9a32ac6fe9b8430dbed47eaaf84581316d1d8245bf6b4c6a7a63ddb37b67596163c683758ef507ae693ed851a3da842163b4ad1f0cf1cc4e66e97d68e4c298b2f39dee043f791f662eed5dcc253774c4f8d30a95530477dd17f4f752e220020209970f2f163ef045d4656642d141bc6b66a154245d73ff237f1822bbda2cf51535e25e86515d93d2884e2185b80ef650027a029bb97317f2297e235482c2c9bdd6c584307d1dad5fe7595d6849b330ce4d42accc3444bff174dd5a53ff00f311e211877a80dbae5f5af7a2f37ade621f3479029b1e985f1400c7133be7665286d5c5243e6840e6a7d95ecf0531a14f39f8bdd99b13f67a8433b148ca4a8771b71ea4db996eff9e1d433d64b890bf26934092b8403cb611c5b6c8c8e774e892b4883d72f782914b7591443ef3e1f9811d77d48a4a66ffed62ab6acf08e0aeda55a79f1b4b4f59f6f60e757a63c62f0a36bc6f9e1a2e4b56d", 0x1000}], 0x7, &(0x7f0000000e40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @rand_addr=0x100000, @multicast1}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}], 0x38}}], 0x5, 0x20000084) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) sendto$inet(r1, &(0x7f0000000000), 0xfffffffffffffe16, 0x0, 0x0, 0xffffffffffffffa0) [ 927.869436] audit: type=1400 audit(1560471343.230:5646): avc: denied { write } for pid=20107 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) [ 928.229240] audit: type=1400 audit(1560471343.590:5647): avc: denied { read } for pid=20107 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:43 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r1 = socket$unix(0x1, 0x2, 0x0) connect(r1, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) fcntl$setstatus(r1, 0x4, 0x3ff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000002c40)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f0000002d40)=0xe8) sendmmsg(r1, &(0x7f00000059c0)=[{{&(0x7f0000000040)=@vsock={0x28, 0x0, 0xffffffff, @host}, 0x80, &(0x7f0000000180)=[{&(0x7f00000000c0)="433ae72dd539b6e158c0ad538de4808c2a1f80e17c8d51cba9b835e623538cbe3da80e035844c3b55224882e4fdd0e94230bbb2f86da27cf4d84a23b35cb3024116df9460299de3a6dd6c8ec95345b18454ec52d2f34f59d61c310ff847b54ac9bf7a5f3e9607632b029a650cb701fff73ea9d1cec5f94a070264ee1c0d2a34fe73121d5e46efaa4d649b7766e76b4092f39f4a8214af086b846281fca3bf1de57eb1fc4fd", 0xa5}], 0x1, &(0x7f00000001c0)=[{0x60, 0x10b, 0x7f, "89f32ae87330562911024b97c972d6fa75fac7e1e1b0f1e1295d48d1b391408f9b3ca759eb7676dd4d0feeb2c8f059ed72f274a3206facbdf50d6aea6e2781d1642ab952081c941a8eb047635b29"}, {0xe0, 0x1, 0xfffffffffffffffb, "0b6c0830c86c82f6be4123d98f3c36926ef9734f130ec2ead52d762f9af1995d4521a0a4a23d3a76f770cda8bcf57514c3228b8488d67ae4eef631b44c4e293c0593d09f879e8c0bd6dcea0ecba1b6cdb18e40ebd75379052d3c1a3009640f5c34f612ec4baea33d9f10dc47d58225cdc13962a162a857252635a4d17abf4ce8f95e940e57343cb32c2b27d1f02fdcbc5152a70798bab123b46157517277baed8dd311cc777f0d844cde68f930986f5f63f12508751cc31f3f812afe1ea3a0e981b2eb92984c1c65c5632e3ea2e8"}, {0x48, 0x115, 0x9, "caa45d61ab95af22d451d2fd20a661b83c40a4ef24698ff2c633447effcb1fed47537b698700a6dc83fe71aaef7ee2e786da5b5ad8772c73"}, {0xf0, 0x11f, 0x7, "d92abe1c9db617483615d73e525b605d65dbcb12fb6dab70b9b4ffdcbaddc72c3c72262d0affbf4ad0c2cb106211aece803f7bfd75c1546d6397893d9cb02243f7d10f216865a544afe67200535df0ce9add0416448f725890c4980a96b390b9f0cdf492273cd02672abd7df0745f071fa6657da11f012772103f41367248af4029f17d537cdaf4f85787256d6edcc6689857904b6d7f540347684b9c5a1b86ed24d8e41f4d4b0649065cf0cbff147f0d1b2d3c0760647c03c0e1ba4ac189ce202daa8e8727e867ddd8c4a5795df4f400380cfe7d2079aebeb9851a85504"}, {0x139b, 0x19f, 0x7ceb, "7b8a4b3ea5f5d46b1fe945c4c836cb3d8335bffd270eebacf1d055d285444ed0dfeec8dc870df6a3893babb9f7adff18566ad0c63a3a7d3f109b730607f84ef855dc84d5815608ac18451a32c88760dfb93b8870446af7b713ae8770187ad342903c6b2122302b4f7a7225150cf2edbb35ef3a82a6537e0669c95e6c55000cc854dc7b517d68a220be1ca460242e3082f505ca05df799dfbe8530b11bfb51ef13c82428bee28b0d2dc8b9fa87cbae649005c9b71c5b25915945011bd5a3bea6e7aa834eef0ea4bf9d79934374acb0cda414f65c12af4b3ba73ec63df0cd488d5ee34a9e141a223a23adf34ddbccf4fcddc13144c4666df8be7c953928141c463f87c19fd1ad795b4d18a1df426041894252d76ded6f212393083178466b00f9edf37741032bc0510f213082076e3a5f9658f109c2e590b164aebf4e7fa9c9d2382e65c97f97eb97c0a2f88ba5a8262d6f8fcb907d3f200f72bfa2da00c24e13857e6af061b61bf8b658b4854470b0bb11cbafb88bed84773869049636868534a2111bb4d7e14feefbf1ec83b2733c73905c702a85b7d28ecf081e8b5c335ddff023580c87aa1cd0a5e7fdd48ad6fd761e90e9164f353cdf582c2fea0fcd9abb4e4de61b1b65525b2a559e91b540ecca45f479cc7162cba716c8371133f90bc7dd4a7a740d21b072adc76e07747315f7dd78e4b7f180e527227b3518bb4aa9bb657628d18031e5b1fc05d4e0d5723fa3335450b5bf1ef87f945375a29b4174b0965d8013754dd39d3753f9fbc317e4df1a0b9df5d83b14282ee7f5e5fb65632e5fce65ef86e35f4f601e33c9d3cfe312917788b18698f10c16f0037e9320426de60443a5ffca85e20e171bff5d7d862656e17e4d615060eb05bbb5ecd9995dcea9fe4978295b57bd1af314941116781aab4f1d7f588fb540f8b3324cf34752b1d16899c83ff632a40320bb3b03c2315963b8ba6c4327259e1b9e6f0f5c380b1689e542fb4941ea24767a7d80b92e994e1a31f600805355b8e7c04c63f1c60d62180db981a2fb84d798e10e495427012b2829fad87ba6f16ef7de7879f2c65229b001a193aa7c9e12ffec65bce469af49b12f3d452cb5c33f070d11aa949429275db6a34fc453de95f93796fa4f5c0f18c58cb992c2b0897acbfd91fab90ba533b264a9b20ffa7537d62235d1b2e05240ff91133a55e4ec1dcc05575bede016129a53175a5effe43e24c8cf55ded4b984b0cd62210510ee18fa4f8f525a6e676419ce32816921a1601c364dcd4b13f8f4179b081c6dca0ccc5bca31943deae8a03901188d17441785f3e13ee7f52974c2419d0907075005b563a5fabc0d51d5b6d7dea91c126f1fdbf6d023b3801ce32cd2399dcee8cdc9229d7b10b4173e634b6f35f6dde1c04241bad453fed72e499dbe88384f39857a53efa77c5a7cb1f7015e703672728887a756f5b30350f04c60caa927f0d8e75be63f2fd6758a7f24ed87974a48aa7f10fd9495aed6eb816e7f1bc78314a2800af55e2058dae35b13dc634ff0c6b4733327423a05066dcef372bc972c9b42f511a7b30b3ae11c5cabb7c71862a36c4ba6e81390f63cde1d934976eb18c679577f88819a6b6a9753954fe240e0d77ee8ae257ce43b527a4f3d816fb7c40abc7d59d048022c4922be3258c28d8a8effcd197cea8f84055420fd7a27b1b29f1608403e85f75fd20847875ad68532f8c18d4213cc7fa5582983782ca8461c0a6c735a2597bcbd0d4ceddb9d2b2bb1c72a408ad425a21f31ca8f490e8a7cb54f5da7013af4ed11473639e01b06585068357c397d849ae2701cae1b6aba08ec89a9a8169335b6050f3b6c06c6460da46142b31bc260bca08fa413cd4f2f7da7caabf037f8cde109a09cf8f3767cd55936103767a3d66c79bcf1f4763c065e186c6db5e22b05baa3f7dcbff8b3746e3ac717e118018418c82f4acb965ce6f45d9f593f7abdf5353b9ac0f734e1001a3add2a57ed68c02884aab6966c6adcabd3a397f8637a131edef45e1f82ffe61969d3f521b520027de3df39850f21e9d5b7e073ebdad58231eb61f57a4387dd3f1c118f0a4674f7454d3ea6c1cc481848a64809bfa63c535bd1ffb690f781fadac7853c1dd3666be57a081135d1f33833381f91370cd6ae57365d1cb33f821fa309cc83753cf51c33c51670aafc21b80f5f67c84b319d237f56efc1f264f3396314fee8c9840d636969852c2e98e8ffe3dc9d3f0be5a94d7170c7ce076f2c75165b998aee41f2cd11dfd0ded696b1feb51492bb9a8b474b42b6e67ee905c4bc3cc09af4e56d4920b8ce04f81920b36cac5f03ae63d757216a9e429e7fa92df4214d081e6a3d1f43940c271c3f6640b8832eed6d354d3b9928f377f5ca72cfaacd729826db1fa5a418153cb341824f8702a4bcc916d9683b4d5ef02bd53cc64a5c79142c1ac3ee66787eb97f98c3ba72e5f59568fe92d80f52afd4823c11be88f9201530b7d523109eae4c4ef4125739bed5840285fe1b78882e9cb6438ea470c2b237dcaaa3e766226c9a7e0a3d5743c2321fd4d3b3b2fc7c15dd5df805d2a6faf810e50a5f0e0cc8d780734a2f0d39557d816242ef2bba1066b662f7cbc404a1aaf6ddb9e00b4b6ca33b471715f9a92a65a9309c1946efee69160abef19d0a4f1d5a1ee5180fd22dc2d3849a43bfdd98b67a331b88a2ff25c80970feef66b1010d91c6ba363803d1ea32666bbed8ababebe9084662faf04d44a9100fa5e31601b94f14c4d9239802d5e57c7bf6791dc339e05e08f62560581ff1fcbc0506adc1d9bc9de1286d80f36ca9bbc23223baa7ebd243a6c8c923a2033fb0b489c3c4adb32fed46676300940d566aee96ee6a6cacc80d9421f831ef830c5bd1e40870a392dab5b7b5f0995c575811c575787a28a33613a780362941945214b1821a965fd3c12a2b48ab0839aabcaf2a402e1b4d4301d09b36a269eec88e116acc19d800daa99f45b94b01341877ec44faf3f73cc13c2dda808e6281b9bffe7699259ca2f6f91e7d91358aa504d9c106d0a99c59b6e59540823b8f291d94d5e98d8d22e287af33c718ec0c68bae42809e7ef5a8dae3cadbc6383b97499a849c58823fef73576c74a39300cd02e138fa6b1a4a83a9474d9a00c24765ee944de7240a2b5ee5e3ec5bb4226de2e5d080b1d6f61a30cc58820653849c81f45fb2964e02644f7bffa4c80b61c6d2fd92f6f17053256f38b20553a82008bf41c0320edbe41bbdcf4c3932d39c610572c465dee217b0b15606be18f2ff13df85c832d5e8bcfd4f34ccf40e795e6ae980b03fad86bf5008bf54ccfcd03580da81e2cf8b0d8c9173b6273c9b5be5741182b177233c205d8bd84dd3f9d6131d32fd0debb7af96bc6b9649de6d1c1f6b0cf2c27ca3bdddcf7dec2dbccc2208da1908252d1c6d987a4947a9bffe45e9f0456a980def4f6b6d29073e9f212e2d30c631f2debe3ddfc9105847be69db7bee06cbfe0bf5fbf315e64906602e091192e65f628c27143bbf3c584b369e1afee4239327ddf12321e3b7c58914a5e5e415c9627de06fa842072b0ae8c3256ad4c2ba251ac66d84d8bd230d0b840bf7bb669a1c8e92f150a1b441032afe52e5e2a0351e9888f1766dc04f5bd42dc99429a1e3049190252f4df3ce4d1fe4d09ecb0f49aa218555f824667b0d5906619a0b998b1d7bbc874ac30a2c3bbe293372003ec1b0e891b9f9f3335c3f37007fbade046d41486f9563c32b97b883a94f59dfa8e3a77f29430e3739469ef88456707eb48452140e94c46643cdbaffcf7157d28c75c4d317d11e4e4d4e7a64b372696b87ddce4caebab1eceb7ad4a132fab6de41714db0b62d6e7c5395241a256771c2a309a1cbe5758855bd4455dbed3a4161bce234fb73fa32ae015aaab29f3ec2d3f176fde18576caf5500c31b8c58633a5aaa078a5fd7fed9debe10fd5c3895da56c0b55a9b71ff0c4c8307a7a80289ff789687b5489fe0b9a255e8850c4ff142c478fca6c80adfca1cca6324830e2eb020c87b38543661c4a7dbf26d02638553a4c03a95cb8d3585d73e17bb12112c260de961e146d2cda6f3343de4011d1537bc07f82e3f66d9d14b002a97969d41b1ce37631a72751ad1475819d779b9b4e6cbe2eabda5412ff0b866e139306feb5db67343591c19454156f022186fba0a6d8ad0e58945e245eb0c20375b7000f58de7d0a8f456feadb0f78c4c8a89a080dd3113e7f396766c42ae8e9df02884187ddcf96cc1e6fa35257d2aa7112a810431c7bc5086117e093acf8480469b1e528b2185b0e0ad0d4e1371e584ad0daf4b4636cdc9257643b5eb6ae4328cd3e9f054cab370a619fb31205aa1137dba8893a32dee8cb087c9e3acad67ea9bfefdffef950dbb6a85ea3cfe058922f46ed15c701cc6f0494f4eba9237588a8e9f6900c17f5721e70ca3cac158081ec00bd18ce29fafa25b105bdce8fb0366ddc93f6b3f4b1df180ad46cdb5e630cd7d742fdfebdffe808c1cd579ea0e2c3a181483a675eb66950302f4d36658794c719f4a10a4f6785b0f1180c585e41aac04aba6ea0e5995ef6ea4d5818910d023a7636bbed5c4bbe53fedbd2ae07a6304771f7f3e8b6b7b8bda97c769dfe7186e26359f8c03b6122abdab2340995258ca9418300e3d0913f981f32362ee0fb72adb7dc1a50b090e6a8bdc582c1cdb1f3f97dcb91d2f5d5b98c4984d3b7b14bd25e4e35b062a8554d03efd62708d04affed2516e9ebf71413e33e02af4c3b25813048feb1b2ef6f4ebc3c1e28981fec8a4bf5cd20bb71a144150214e1899505845d6b73533678234b1bd58fbb007445fbfb6d285c105792764fafaf1158f3ed398731dca823fb837b4b98b7d10ea704965407b92e000b45b36d4b28e9a11c600893c8b99d75b36160c5080487aaaa470345e82cb701e8e685991d1df37c8ba11febd11c0de961641b41ec57ea6dc994b67ba44a52d7d1d27d667b4f88e6238844a8e30d4660a7e5629212bb7c82246c8419e8610ed4277096b36d6e064979984713a4e229d890deead3f74491e7f0e47029adc634f8cdba1f2c17a8a09239917a9b9486d864e43354f3f3af49fda09b2ad5e78fbc8d313f226b7293297fda7abc119535590566bd1d74fb1e955c448329eae12e2664cb4b7e598d11005fb778365b25e98184274e339b793d739837d82d529b0a78a0e1b02dacba88a1c1aa867cd7a4f6638eef3f5d7ecc4deadc2f7196f87710daa174d73a24a93c86b1673933dc421d802fcc7a4a476137d20d16a408f28959c6b56a267fd19044b09d2a2b34030301fae0fce30b369fdbeb822cc20ffc7fc8d0019a407d2616593349d1d56b8dbda24910d6badb3f33d2ee29c8e62ac5f01d74a417103593c25ff1e20ab8339e0e896c5e3bac2088cc79c7658a245891cd12820e72efd4d4214f5d22f4f21fe76068b490448c0e1d08ea56a7396ad9ec93876e8f1b9cf1fd6f6a4c476f267d8e2ee050f8ef53eafc1ea69dbfa56723fe9595182997a6563ca7324d7657b631e1c7fc7ed6f4b2f33c1e10d3ce11aa71b427b6bc765ae1da7d204df524e30a377c884c6c21f62fb31d82e290720baa73a1ed8de15aa302239c817b992501b0a2dff628c3c911c2937743d1d4a69df28529aa62d9f2d010904d5c43c067129b017366dd8f3ed9b54155604b4525e22627a12c601251727333bbe6b034df6f664a41d827eccb85168b16dee767db4d672a7347eca25455892726671d730a89d07af37f8d92280678d63d984a099b290d"}, {0xb8, 0x10b, 0x40, "bff55206a90f2aaedbfce4738d31c12c0bbd26b6aa6ec332b2408663c1f2896d91d07a307d12bcf9dae815747e2f04b9ecec70b3f34066f03db477698607576b24ef1657ec7ac8e0bf6ea90781794d8138193e5ac8e0dea7fbf54c9113de0ae4bfa20d608b46053aff1ba0aaafd4ce2c694a95c00edf1f0c45da9e61189a26b1ab626becc8bc09d747934817c0771ebb17d7dea92a9b840d1d8c8e14901b218943308c1ed4"}, {0xc0, 0x100, 0x1, "098acfdbf84040ee9d7ede7d71ef0662fcdd020cefac5ffdcb988fee0191d0f1ff08d08c6351065fc151b3c960a3c03b34526599cf1481446c91c71b6ecf9fd1895e392a8aae92c3044c4543fd4e8549668148e734c75e11011ec4a588384ff7e51a9142221516a68ef37edd9724f1b4471a5f558efc22382c657bc216403f00265c5bba99615b4303da6e7f0025a912f263aacef628e7914ef05c9bf0248a0ed3d1328a793ab07e48db63ce"}, {0x20, 0x112, 0x1, "317aaf40475c8c39d8a031e6f5"}, {0x48, 0x117, 0x3ff, "3d9cac443879b1babc3e9c0eff5c3ec9f24c14b8cc4e6a07d210c6519ff0702aee6efd1e51098d2e95da0c62818cf4804008cd39315c12"}], 0x1468}}, {{&(0x7f0000002d80)=@hci={0x1f, r2}, 0x80, &(0x7f00000051c0)=[{&(0x7f0000002e00)="dd3de4596e39ffdf6fd9a4028006201b1e78b599ec3ab12021178446e1a3a0eea0b653efdc8b3f6bf7c0f8e7cc6a0ee766926593730c1453fa997556a649d674ff006ca51403c3d03f117feecbbf3cc5d2aa9c700d3b57554ca90d635291f06d931e399c415bc5cbdbaf0723fa2b0bf9d46ec0d97c123e526ef99eb02857905aeddbdce7380b9b45d537ca93c9f3b6ee5a7ecfcee277bcac57d645f06d4489a442fed82f6a5f0b57c168a36300e67bfb38c82f128a09ca6dadcef8c0cda3b1aa25e6d238dca1a5d1e26da49bbf335608a4781bf6efd2a9eee6a1bcfcc30884ce857d0e6caf6348f2668c1c3c033458679e1fd49b", 0xf4}, {&(0x7f0000002f00)="948991494fe496c608721ebdcf81e2f28230cd513397bf1f17f16d32405877d42afa44983415b48348e06f5c6064bc6af9f20992e08ae533a30954b997d3584b72ddb5f557f20a1eb6eb5c818d5c2201eadf27fbc75d2900e32e53f1dd0404a8e466712898f6a4f74539e5f26c93205734903b74c7cf5804c0ee", 0x7a}, {&(0x7f0000005080)="8b2c30adfa3f4e93f74fe47872fc5952236ad8a3265c02ec6fb3f31c9ea8ca82bfd2c65cfef2cb60186300d88ef4b2ed50dafe7185f8417b71cff5bd000411b02ae6d5ee875301ede8e02bd85d3a726f10b63b675d7aeb02c66e1094fdc4fa39460eae721239c4de3aaac09612724265699ea440348551c44f8814cf7d6a535bc0b1823c28d193381b8968ab90b2c264", 0x90}, {&(0x7f0000002f80)="8cb4d7f3982109af3f460e1589483de214927b4011a3d8df01e525", 0x1b}, {&(0x7f0000005140)="7b66912e0bc7f58c05b2d282d9382fbb20581a1ffa5d3d5c443bce3f10bff3e659163f91fd3d4478030d78985f899eb60f64fe325b54810d671dde2112ad5f1703e317be0b74a99f16c016beee7edea64441784b1482556a7047a47741f6dd1bca98276df3271afe05364a0a", 0x6c}], 0x5, &(0x7f0000005240)=[{0x30, 0x11d, 0x1f, "0b4ede8683a2056e7ee096205529d3832a64bf28a72f4a1b935c940d"}, {0x110, 0x10b, 0x80, "18f3daff471d13ee824e08aa61fc2b145956c8fd70d9ac3344e15384aadccc8dd2f1981a14e24024dc264bfb177976bf08d92d57cd5699bebacc0943a4cc34931e9784a174c0c54d6d7dbfc95bac97c03bd3b4d5251947f12bee0fc5823616ff44f9e1847a001cd097166a4c32eb088bfe11d3374f9145e7920413bea73c376171b4abd9ed13abcc3e60eda0d1da4d22db3f0b8096562f0b81a89295cb848eec412d7f0f4b535205d7ec2ede5c573f895d235fa0851a4fe29a113d3482def50c3b9d1350f931d9c935673d75dd634a1a251cbc21a78c65ecf060229dfa38630fd2362856460ee852e32e6809769717d63b179a62b87597f7e080dbbf"}], 0x140}}, {{&(0x7f0000005380)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x894, @local, 0x2c}}, 0x80, &(0x7f0000005940)=[{&(0x7f0000005400)="67a63a5c6b050a3e5276753de5f1d3c9270fc6d090feda98d1f458f4e88ffe972d5cde06c3a490ba9197a6b91c744970e2dce630d603a9e51c4447ae5e2f4c67b19a1f538dffd96021fe471551a90490f4f6bc66866f3b569ed283af571313e051a2a3ec069915403c8f3a7452ebda5f3c8c", 0x72}, {&(0x7f0000005480)="1e5aeda177c5736f2b8a7e528facdf774863bd25100b9631c4202f64342c18bf813d7d5ce9234dcc8e10f5e179be4a0b02f22c5d2fe01c5250766c5260b924c0224ca7cf731ba7c21d32945581312a1bfb545f55f84fb97177ef144968f36e", 0x5f}, {&(0x7f0000005500)="462714eb41b7edfb2d595137533e3b21f827d409e4c59b33b59a6e85bae5f717640a9e18082174824776248b6ecf6f162d2ecab80c1edff03f8f72f419e2efa80fadd1560c5d3a1ba64c527386f8382e25b36450ec014acd877367fd3112b3554159200ea2d10f4f48b700efd5b2250c5346196f5b08b5f74ad88b4652976f535e0bfecbd4e842421fa5d736e143acba376d184943b831406aaea73b61a6d2a359e508c3ce92ea6f7cd3fc51fee6dddd23494e0f86ae42df5fa36cd69e0a665828405c270bda2b", 0xc7}, {&(0x7f0000005600)="6551fdb0d5eb8aaf48f1ae4bde62484572bfa6dd0f16b0d39966418e07fc4f5a660c8663210fec79aac13d820128b32babb03cabc48ee92ada873bfa9ef6fe5f9dbbf845ec84a5a27f54759eda4c9bb373a119ee4f79557a05ca152063ae84afcb474fef4d358d416de9322d3d30a3ee038a775e3092b427672dc8de540746859e5b46fc1158b18644e82d4775d57e5fc1e96a667914eeac42be7bd9136df9174f322ab14f50013246", 0xa9}, {&(0x7f00000056c0)="cd7b9c445970262e0c173a59aa01092355285ff012e7b257a2ada6d5803cb0c6bb0c692e6ca7c7e01e458c2bc50d31d3b6c86ec68cadff06378d34f18bc1e043db5a5159ba2c270190c2fa6790fd6db5fbaa91f9c2bf649ee4c77a27877279b4dfbb9b9b66ccd76ceb2c895d33f749c15ebfb3eae85fc53ff25052400d0db82c686638db0bdf6ba4bd0fb1633e1d30690d807b42d78b28850f82b4fa3670b8001bce5b338cb57a7a8369e08ec5cc2104aecf2e1571beac1ce07bd6845a211c6696cf01e568f007713bf404005d15ac4f60d185251f2ea673b38fe7ad76209f40cd6951af790c5b9cc45780c57285", 0xee}, {&(0x7f00000057c0)="a32ed0961527a688713cc2b52784170cc807689d0a1821c8b35a9f4b4e64f07015f1c1d0c740964539460512b620e81495b8d1e52ccaa100b25b772b8c9aeae26258", 0x42}, {&(0x7f0000005840)="a0000e43f8f07cb20f7ba03e3bd6c3bec0b35c79e654ff2e93f0922412524890de4c0de30913d6ec0523ad45821c401557d3f243d279f25c5abcf7fe6172d2470f84272399a2a676b07a02c86d5a264a0698e24c365a03dca0a29ce53a352d09c54881e158ff73c4cc73496d23e71876968edd38c31022414ae4a6c078c084896550650e1829807418ff66f614a0d4179bbc32914e6feb9caf2363e52a68f1ee542981286daec19a98ad7813fc31d55cda6b029dbac134b11a3e37ccc9ee6a7251472069f9ff19e7247967de57a271af03771fdeec418cca48e7c69178d2afecfa655756f5c8887d7ca1211403f44b472671", 0xf2}], 0x7}}], 0x3, 0x0) [ 928.242094] audit: type=1400 audit(1560471343.600:5648): avc: denied { create } for pid=20107 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 928.254803] audit: type=1400 audit(1560471343.610:5649): avc: denied { write } for pid=20107 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 928.611148] audit: type=1400 audit(1560471343.960:5650): avc: denied { create } for pid=20102 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 928.613520] audit: type=1400 audit(1560471343.970:5651): avc: denied { write } for pid=20102 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:44 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)) getresuid(&(0x7f00000001c0), &(0x7f0000000240), &(0x7f0000000280)=0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast1}}, 0x0, @in6=@empty}}, &(0x7f00000002c0)=0xe8) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000680)='/dev/full\x00', 0x20000, 0x0) write$selinux_create(r3, &(0x7f00000006c0)=@objname={'system_u:system_r:kernel_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0xffffffffffffff00, 0x20, './file0\x00'}, 0x69) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000580)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000340)=0xe8) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0xc, &(0x7f0000000840)=ANY=[@ANYBLOB="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", @ANYRESDEC=r1, @ANYBLOB=',obj_type=user_id,audit,pcr=00000000000000000034,uid<', @ANYRESDEC=r2, @ANYBLOB=',euid<', @ANYRESDEC=r4, @ANYBLOB=',\x00']) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$LOOP_SET_DIRECT_IO(r5, 0x4c08, 0x1) 00:15:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:44 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0x7) setsockopt$inet_int(r0, 0x0, 0x16, 0x0, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) prctl$PR_CAPBSET_DROP(0x18, 0x12) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000000)={0x8}, 0x4) 00:15:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) timer_create(0x7, &(0x7f0000000280)={0x0, 0x19, 0x2, @thr={&(0x7f0000000000)="9b4324a7c3028c339edd250b485af5a365fd3a4216cdb6ebf2c90dc56f438685e0223380b0c7948466f975ec2624245012c81749c8065485baf05fbde2db2b56eeaeaa0681798a37cc869abc33c00f9ebc02613819ef47000bdfea378eb3e3fbac67", &(0x7f0000000180)="99142b2b9d701349c5108e81c403a6bf9ddf6c6ca09453a249f7ddde6dfdcbfe4100ef7be1f6375b5590528aa764f943eb38acba46968df77c2715905a83964e6793716d2b19f9b08c04cf9d3e8cfb20b41f852e63b500d58675be3141d77a8a249e66ccbb3f5eeef9fde382fd01e9f9a7e0d245121cec4ab15076659ef88f47fcd3f2441a5aec8f684e89dae38682aff8f4ff0e5a6211430f2e39bea57f01e799b9a7d90bb49878bea51e998dc6506565d2de87fc030e715e3432cce9df539d96bc1beb1969368107"}}, &(0x7f00000002c0)) timer_create(0x2, &(0x7f0000000740)={0x0, 0x33, 0x4}, &(0x7f0000000780)=0x0) timer_gettime(r1, &(0x7f0000000300)) sendmsg(r0, &(0x7f0000000640)={&(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x2, 0x3, 0x2, 0x3, {0xa, 0x4e22, 0x425f, @rand_addr="b3f9ced47a0b17b1f4fadab2d30cf77d"}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)="b81b61662fb0cd4a4e7126bd7eb0834fdda2e1c4711a90c2de4470fde7120e9cf1bfbaf0024871daa1bb29b1827b3a3f4c305dabac59a744854ce9e8edc809941143c145adf313e4996d436a54a8255b97833e0c0bfd8e2e66bdb3113ddbcba6532d331870f03c975ee6d8fbcc842b9e101c4bd7d6f936875adc23b41466f70c4f399c6509dd7a975a3388abf72007ab7bab1b9204bccdf162e4557f6e89af438b49462e52a1", 0xa6}], 0x1, &(0x7f00000004c0)=[{0x98, 0x111, 0x401, "25fdf728595d23eb43e28cae85db00c0c10290ac89c26f92e44752d1a527997cf9e76d5ae4dff2cfae935e26b2c8320218df576ffd1af76e3a8a7cf6c465350d7416d71e1ee742236079fb4f5f6cc46bb55f0a30399f4ecb200303fbde84a2fc236270dce90b7488f697a0ca50e981cbfbffce74be8babf1a0b0ab22c71d5d2a04"}, {0xd0, 0x10f, 0x7, "d1f1ff4ea39f2264bae7b4eb0909848d25b77c0849a3362315a86398935e0852c9d499027ab643f71837a88b435f17c0594c12217d4067fc2564f6ed394b233e7f00d8ac80ac468c1dfb2f9e8a95721bf4dcc4f7d7787adc308995f0c7e77ec1be387e4e6d1d68c7824d0fb6858236cf63a11be20a8b16ebbcc436a9d352a6d90e8492680d26611802a2ec2a7c45565ee7b4593ac135ca224f35e349ad24af2d239c8a6a46a18db0c9d2224b291a429de19b3899e6cc75a592"}], 0x168}, 0x90) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f00000008c0)={@dev, @dev}, &(0x7f0000000900)=0x8) r2 = socket(0x11, 0x9, 0x9) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000940)={'mangle\x00'}, &(0x7f00000009c0)=0x54) bind(r2, &(0x7f0000000680)=@ax25={{0x3, @null, 0x7}, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}]}, 0x80) r3 = fcntl$dupfd(r2, 0x0, r2) openat(r3, &(0x7f0000000700)='./file0\x00', 0x4140, 0x8) setsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000100)="a2e6fa9a", 0x4) ioctl$FS_IOC_GETFSLABEL(r2, 0x81009431, &(0x7f00000007c0)) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x79) write$binfmt_aout(r2, &(0x7f0000000140)={{0xc9, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x20) 00:15:45 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) 00:15:45 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x420000a77, 0x0) write$apparmor_exec(r2, &(0x7f0000000000)={'stack ', 'eth1,GPL\x00'}, 0xf) write$binfmt_elf64(r3, &(0x7f0000000000)=ANY=[], 0xfffffd88) fcntl$setstatus(r3, 0x4, 0x2c00) close(r1) [ 930.045383] SELinux: security_context_str_to_sid(root) failed for (dev bpf, type bpf) errno=-22 00:15:45 executing program 2: pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80008}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x30, r3, 0x400, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x101}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xffffffff00000000}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x90}, 0x8004) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r2, &(0x7f0000003000), 0x7c) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r2, &(0x7f0000000380)={0xfffffffffffffddf, 0x0, 0x2}, 0x10) 00:15:45 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x24}}, 0x10) socket$unix(0x1, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000300)={{{@in6=@dev, @in6=@initdev}}, {{@in6}}}, 0x0) getpeername$inet(r1, 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000200)=0x78, 0x4) unlink(&(0x7f00000007c0)='./file0\x00') fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, &(0x7f0000000540)='./file0\x00', 0x8, 0x0) bind$inet(r1, &(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000580)={'NETMAP\x00'}, 0x0) r2 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000440)="50a935b7788c68c040ef89481c4d8ef09c4ce4350186ae87ee1a9dfe129312ceb149859e5e8e3c25a2e74b776d5dd70fc86821087bd32356f27458e3d841b2083205e8fcda86c9a4147549f1ca3a", 0x4e, 0xfffffffffffffffd) syz_mount_image$f2fs(&(0x7f00000004c0)='f2fs\x00', &(0x7f0000000500)='./file0\x00', 0xe8, 0x4, &(0x7f0000000740)=[{&(0x7f00000005c0)="333c59b2829edc6210b18abce227e20ff3cb3ac01a6c381cb34fb16b297be487cbc44d2684778d103e654753d03654742141687e0e22f8b410946d1a63b61c39ca3e989bab1ca27c37b12466ae2a346af38f0ea04074207147c7e217b8d8273ca489e4d82bf9b137", 0x68, 0x14d2de9f}, {&(0x7f0000000640)="95b0f5d9ef537bfdb5a9a30565417cbd07e9f84ada3e4d72e97afd1f136bb21829f6cc41b72affebdeaa197b1194fa66aa1dc61955b2349168cdafc3c0cbf253824b6c3975990ab7faf40f98e1659752dd7682ae6a22edf38a92fe7537f42080fbb59479a9e673cf89e8694c4cf799dc63381dd274eb8e033e76c674c570092f3fefe054c685c729e81647013ce362789134ab86510a33cd3ac692e4f28036df45ddfee433", 0xa5, 0x800}, {&(0x7f0000000700)="43001d0ac791e849d6ec3bd6701d713894967072ae92d0ad200180ecb702ca1ab43e408275931fdb491c3282718d35a73ade", 0x32, 0xffff}, {&(0x7f0000000800)="9c345b9112cf612906b600d6a5ba09f1a15bc4f9bb1b7bfe3f8970e47c967394f7b2c5e97d272a4c97a09f384ff9c8dbb2c48601da7caede5a06c43793ef9b92edab516056eaef8a4e898f679e1e545428fdb1906e758ebf9105371a3fc87080939208bd74c0f29c3974a258474a674c7ef02d9471133f320ea4082aeb0c194d0a83056e68692b4333e93052dd48149f60c4d9310a3e1e0e1e857d3c30b959394bf39b4fe14ac958194cb905316d9bbb4090b0732ac9ebc2f37c", 0xba}], 0x10000, &(0x7f00000008c0)=ANY=[@ANYBLOB="6e6f696e6c696e655f64656e7472792c6e6f61636c2c666c7573685f6d657267652c70726a6a84756f74613d73797a2c696e6c696e655f64656ef972ff2c736d6163d422607a61743d4e45544d4150002c00"]) keyctl$update(0x2, r2, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) recvmsg(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x1000}], 0x1}, 0x100) setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, 0x0, 0x0) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) ioctl$KDSKBMETA(r3, 0x4b63, &(0x7f0000000400)=0x7f) write$binfmt_elf64(r1, &(0x7f0000001640)=ANY=[], 0xf5aab446) 00:15:45 executing program 5: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) 00:15:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:46 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) [ 931.046742] audit: type=1400 audit(1560471346.410:5652): avc: denied { create } for pid=20177 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) [ 931.197747] audit: type=1400 audit(1560471346.560:5653): avc: denied { write } for pid=20177 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:46 executing program 4: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@broadcast, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @broadcast}}, 0x0, @in=@dev}}, &(0x7f0000000000)=0xe8) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r1, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x203988731563797a}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x70, r2, 0x400, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x5c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xe37}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4506000}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@rand_addr="6f112f1b282b587e47775ef6944b2a96"}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xffffffffffff0001}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x8000}, 0x4000000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000480)=0x0) sched_getaffinity(r3, 0x8, &(0x7f0000000380)) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x80000000000005, 0x8, 0x9238, 0x6, 0x0, 0xffffffffffffffff, 0x1, [], r0}, 0x358) 00:15:46 executing program 0: r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000080)={0xa, 0x0, 0x0, @initdev}, &(0x7f0000000100)=0x1c, 0x800) r1 = dup(r0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x14081, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000140)=@generic={0x2, 0x0, 0x1000}) r3 = getegid() setfsgid(r3) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0xc) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2100001ff8, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000080), 0xfffffffffffffffd) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) ioprio_get$uid(0x0, r5) write$cgroup_subtree(r4, &(0x7f0000000100)=ANY=[], 0x0) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f00000001c0)=@req={0x8, 0x8, 0x65, 0xccf}, 0x10) 00:15:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_targets\x00') write$uinput_user_dev(r1, &(0x7f0000000480)={'syz1\x00', {0x5, 0x0, 0x640, 0x8}, 0x6, [0xcf, 0x9, 0x4, 0x19, 0x0, 0x0, 0x6, 0x200, 0x9, 0x1, 0x9, 0x1, 0x9, 0x1, 0x209, 0x790, 0xf69c, 0x9, 0x7, 0xffff, 0xb2d, 0x1, 0x100000000, 0x100000001, 0x8, 0x4, 0x7fff, 0x80000000, 0xffffffffffffb671, 0x8, 0x8000, 0x9, 0x9, 0x10001, 0x1ff, 0x9, 0x1, 0x9, 0xc13, 0xff, 0x62, 0x3, 0x1ff, 0x6, 0x4, 0x10001, 0x3, 0xffffffff00000000, 0x7, 0x29, 0x3f, 0x3, 0x4, 0x5b8, 0x4, 0x4b, 0x209c7829, 0xfffffffffffffffc, 0x3ff, 0x1f, 0x5fa08816, 0x1ff, 0x100, 0x4], [0x9, 0x2, 0xffffffffffffffa3, 0xfff, 0x80000001, 0x6, 0x2, 0xfffffffffffffffd, 0x6, 0x6, 0x1f, 0x8001, 0x5888, 0xffff, 0x4, 0x7, 0x6, 0x100000000, 0x0, 0x2, 0x7, 0x2, 0x36d, 0x400, 0x179, 0x4, 0x8, 0x3f, 0x8, 0x11, 0x5, 0x8, 0x8001, 0x100, 0x8, 0x1, 0x7, 0x5b7, 0xeaa1, 0x1000, 0x4338, 0x401, 0x8, 0x9, 0xd2, 0x7, 0x101, 0x400, 0x263, 0x1, 0xcf24, 0xffffffff80000001, 0x5, 0x2, 0x69, 0x1f, 0x9, 0x87ff, 0x7ff, 0x7461, 0x4, 0x2, 0xc0e3, 0x7], [0x3, 0xffffffffffffffff, 0x0, 0x9615, 0x9, 0x9, 0x7, 0x9, 0x7ff, 0x2, 0x7fffffff, 0xe2bf, 0xfff, 0x0, 0xfffffffffffffffc, 0x80000000, 0x4, 0x2, 0xfffffffffffffff9, 0x1, 0x1, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x34b, 0x0, 0x4, 0x3, 0x8, 0xf2f, 0x2, 0x4, 0x10000, 0x227c8cf3, 0x1f, 0x0, 0xf291, 0xf4, 0x5, 0x1, 0x0, 0x2, 0x1991, 0x1000, 0x9, 0x66b217fa, 0x2, 0x40, 0x9, 0x3, 0x4, 0x2, 0x0, 0x1, 0x6, 0x9, 0x0, 0x6, 0x5, 0x400, 0x529, 0x100000001], [0x8, 0x5ef, 0x3, 0x0, 0xfffffffffffff800, 0x2, 0x401, 0x6, 0x5, 0x5f, 0x6, 0x10000, 0x4, 0x7f, 0x768, 0x8001, 0x1, 0x80, 0x1f, 0x7f, 0x7ff, 0x8, 0x2, 0x3, 0x6, 0xffffffffffffffff, 0xbe82, 0xff, 0x400, 0x5, 0x1, 0x1, 0x0, 0x1ff, 0xffff, 0x1, 0x101, 0x7fff, 0x4, 0xfffffffffffffffd, 0x1, 0xe506, 0x6, 0x2, 0x6, 0x5, 0x100, 0x100, 0x0, 0x4, 0x0, 0x6, 0x59, 0x5, 0x80000000, 0x0, 0x447, 0x0, 0x4, 0x6, 0x80000000, 0x7f, 0x80, 0x1]}, 0x45c) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) getsockopt$netlink(r1, 0x10e, 0x2, &(0x7f0000000180)=""/67, &(0x7f0000000240)=0x43) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x46400) ioctl$TCSETX(r0, 0x5433, &(0x7f0000000140)={0xe0, 0x5, [0xff, 0x1, 0x2b66, 0x3ff, 0x100], 0x7f}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) io_setup(0x1, &(0x7f0000000080)=0x0) io_submit(r1, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f0000000000), 0x200a00}]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) 00:15:47 executing program 0: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/policy\x00', 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, &(0x7f0000001440)={'nat\x00', 0x0, 0x4, 0x5c, [], 0x3, &(0x7f0000000300)=[{}, {}, {}], &(0x7f00000013c0)=""/92}, &(0x7f00000014c0)=0x78) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) poll(&(0x7f0000000100)=[{r0, 0x2000}, {r0, 0x20}], 0x2, 0x81) mount(&(0x7f00000001c0)=ANY=[], &(0x7f00000000c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = dup(0xffffffffffffffff) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000003580)=@nat={'nat\x00', 0x1b, 0x5, 0x7e8, 0x0, 0x608, 0x160, 0x2a0, 0x2a0, 0x718, 0x718, 0x718, 0x718, 0x718, 0x5, &(0x7f0000000200), {[{{@uncond, 0x0, 0x118, 0x160, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x8, 0x7, 0x1ff, 0x1}}, @common=@icmp6={0x28, 'icmp6\x00', 0x0, {0x12, 0x9, 0x2, 0x1}}]}, @MASQUERADE={0x48, 'MASQUERADE\x00', 0x0, {0x0, @ipv6=@local, @ipv6=@mcast1, @gre_key, @port=0x4e23}}}, {{@uncond, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@frag={0x30, 'frag\x00', 0x0, {0xb7d8, 0x101, 0x1, 0x1, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0xe, @ipv4=@empty, @ipv4=@multicast2, @port=0x4e23, @icmp_id=0x66}}}, {{@uncond, 0x0, 0x320, 0x368, 0x0, {}, [@common=@inet=@socket3={0x28, 'socket\x00', 0x3, 0x3}, @common=@unspec=@bpf0={0x230, 'bpf\x00', 0x0, {0x28, [{0x5, 0x3038, 0xfffffffffffffffa, 0x7}, {0x7, 0xb5100, 0x4, 0x100}, {0xffffffffffffff2a, 0x1, 0x6, 0x5}, {0x9, 0x3, 0xffffffff, 0x7f}, {0x5e7c, 0x10000, 0x5, 0x3}, {0x4, 0xfffffffffffff800, 0x3, 0x2}, {0x9, 0x20, 0x6b35, 0x7}, {0x5, 0x0, 0x7, 0x7f2d}, {0x2, 0x10000, 0xfffffffffffff001, 0xff}, {0x200, 0x6, 0x1, 0x7fffffff}, {0x9, 0x7f, 0x6, 0x90d5}, {0x80000000, 0x1, 0xff6, 0x3}, {0x8, 0x4, 0x3, 0xc7}, {0x6, 0x322, 0x6, 0x6}, {0x20, 0x1, 0x3, 0xded}, {0x40000000, 0x80, 0x8001, 0x13f3f37e}, {0x9, 0x7fff, 0x9, 0x8c}, {0x8d04e60, 0x2, 0xfffffffffffffffc, 0x2}, {0x9b, 0x3f, 0x2d, 0x3}, {0x7c1, 0x5, 0x4, 0x100}, {0x5, 0xa6af, 0x6, 0x9}, {0x5, 0x2, 0xec6, 0x3}, {0x1, 0x80000000, 0x4, 0x3f}, {0x1, 0xfffffffffffffe01, 0x8, 0x4}, {0x0, 0xffff, 0x800000000, 0x1e28000000}, {0xffffffffffffffff, 0x20, 0x1d, 0x2}, {0x3, 0x7, 0x9, 0x17f2}, {0x4, 0x1, 0x7f, 0x10001}, {0x6, 0x6, 0x80}, {0x0, 0x4, 0x1, 0x8}, {0xfffffffffffffff8, 0x8000, 0x9, 0x1ff}, {0x3, 0x7, 0xefe4, 0x1}, {0x9, 0x100000000, 0x401, 0xff}, {0x40, 0x4, 0x2, 0xff}, {0xffffffffffffff81, 0x200, 0x9, 0x8}, {0x6, 0x8, 0x8, 0xffff}, {0x3, 0x1, 0xe2e, 0x7}, {0x9, 0x28000000, 0x11, 0x4}, {0x7, 0x7, 0x1, 0x6}, {0x100, 0x7, 0x401, 0x6}, {0x80, 0x1fe, 0x4, 0x7f}, {0x100000001, 0x8, 0x8, 0xfffffffffffffffb}, {0x401, 0xe8af, 0x3, 0x7}, {0x8, 0x401, 0x40, 0x5}, {0x8, 0x9, 0x10001, 0x5}, {0xfff, 0xf3d5, 0x9, 0x5}, {0x5b, 0x7fffffff, 0xfffffffffffffe01, 0x1}, {0x3ff, 0x8, 0x1f, 0x1}, {0x7, 0x10001, 0x0, 0x9}, {0x29, 0x2, 0x6, 0xffffffffffffffe0}, {0x5, 0xa, 0x3, 0x24d4}, {0x23cd, 0x7, 0x0, 0x5}, {0x0, 0x4, 0xbffc, 0x63e7}, {0x6, 0x1, 0x21400000000000}, {0x9, 0x4, 0x7ff, 0x1}, {0x0, 0xfffffffffffffffe, 0x8000, 0xfffffffffffffff9}, {0x7ff, 0x400, 0x0, 0x9}, {0x1f600000, 0xfffffffffffffffe, 0x10000, 0x3ff}, {0x4, 0x3ff, 0xffffffffffff34c1, 0x400}, {0x0, 0x7, 0x20, 0x62c}, {0xe000000, 0x3, 0x6, 0x5}, {0x0, 0xb49, 0x2c, 0xffffffff}, {0x1, 0xfffffffffffffff8, 0x2, 0x7ff}, {0xffff, 0x4, 0x9, 0x1f}], 0x1}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x1ff, 'syz1\x00', 0x900b}}}, {{@uncond, 0x0, 0xc8, 0x110}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x4, @ipv6=@local, @ipv6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @port=0x4e20, @port=0x4e23}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x9a5) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r2, &(0x7f0000001500)={0x8, "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", 0xffffffffffffff48}, 0xffffffffffffff09) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000340)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, 0x0) fadvise64(r2, 0x0, 0x0, 0x4) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x80000) setsockopt$inet_buf(r1, 0x0, 0x11, &(0x7f0000000280)="6c701fd5a47186708522599e91235ddc1bc91cb019cbc70a9e02bcb551f5372feac1c8e5678f6fae705f45450dddebc828a1c3b5f8eaa923d003b8182f65279360529c74f6b57e41", 0x48) 00:15:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0xa4) r2 = getuid() getgroups(0x1, &(0x7f0000000240)=[0xee00]) getresuid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000340)=0x0) mount$fuse(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='fuse\x00', 0x2000011, &(0x7f0000000480)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1200}}], [{@measure='measure'}, {@smackfstransmute={'smackfstransmute', 0x3d, 'rootmode'}}, {@euid_lt={'euid<', r4}}, {@appraise_type='appraise_type=imasig'}, {@obj_role={'obj_role', 0x3d, '/dev/fuse\x00'}}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@subj_type={'subj_type'}}]}}) ioctl$TCXONC(r1, 0x540a, 0x1000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:48 executing program 4: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/status\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x18a901c0}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r1, 0x104, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x40}, 0x10) mmap(&(0x7f00009fd000/0x600000)=nil, 0x600000, 0x0, 0x6031, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000d04000/0x2000)=nil, 0x2000, 0x3) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) r2 = dup2(0xffffffffffffffff, 0xffffffffffffffff) getsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000000), &(0x7f0000000040)=0x4) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) 00:15:48 executing program 0: write(0xffffffffffffffff, &(0x7f00000000c0)="1b00000021000707000000000900e4010200001e00000000ff0804", 0x1b) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000200)=r0) getpeername$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x6e) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x1, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000140)={@loopback, 0x0}, &(0x7f0000000180)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@multicast1}}, &(0x7f0000000540)=0x1d2) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000300)={{{@in6=@mcast2, @in=@multicast2, 0x4e22, 0x0, 0x4e23, 0x0, 0xa, 0x80, 0xa0, 0x33, r2, r3}, {0x1, 0x4, 0x57f46a32, 0x0, 0x80000001, 0x6, 0xe7d0, 0x3641d2fb}, {0x80000000, 0x8, 0x81, 0xcc3}, 0x3ff, 0x6e6bb5, 0x1, 0x0, 0x3}, {{@in=@multicast2, 0x4d6, 0x6c}, 0x2, @in=@broadcast, 0x3503, 0x0, 0x3, 0x0, 0xae3, 0x3, 0x8}}, 0xe8) 00:15:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) [ 933.790338] audit_printk_skb: 24 callbacks suppressed [ 933.790352] audit: type=1400 audit(1560471349.150:5662): avc: denied { create } for pid=20254 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:49 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/anycast6\x00') getpeername$packet(0xffffffffffffff9c, &(0x7f0000000480)={0x11, 0x0, 0x0}, &(0x7f00000004c0)=0x14) r3 = fcntl$dupfd(r0, 0x0, r0) sendmmsg(r1, &(0x7f0000000dc0)=[{{&(0x7f0000000180)=@caif=@util={0x25, "fa4b43def37c86b37f5680ac7066da09"}, 0x80, &(0x7f0000000340)=[{&(0x7f0000000240)="2091e9411e47f6d8d670d86e4d8b255740814b4104d40ba6d0b6fd5020e96939f188b9e632369775052fc81e4b12c68ad8bc7849c0d4e79a08491d4d21cc5bcce2bbb130a64204bb96c383015d485c714b5630ab6d272947551e44f950ac04c05401dba5a9bbe8f02647810f75eb86b0d1f4266f6bf668ef83b58c767c06003cdc5d99232613b80d0aa424eab95cd74d4e795e9b1009eb", 0x97}], 0x1, &(0x7f0000004040)=[{0xb8, 0x10b, 0x4, "c1f07b3cf165cd484ca4cff785b91e8823222ca86e0bbdebd1760753bdb29fe7746a3196b321b3011324b892d4e650b5f1811e85c9d78ba52a5e05980b6ff7f49856d4becf65317f3542269888dd9f685ed04a7b126476119bd2689ada02ff08725135b34b7f3f9b6a067a24deba6801ded108b0a0e28f8dc0d770a7407725fd8ae839eb614bef3dcb1df41403794736c4ed111417f737c833ebd0ed3528725dab0bd088e961"}, {0x1010, 0x1ff, 0x2f8, "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"}, {0x58, 0x10f, 0x9, "27f220588663eee7e3bede4782a75f97c4145fa70f08f1ce43002356d60fe74c19875abc66860210de6c6bb3c082df89d16aae7d0fa9a8c5a2303159b9072d13deba"}, {0x1010, 0x105, 0x64e2, "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"}, {0xb8, 0x113, 0x40, "a45ed8d2041d176d47c88628ec468c484e86314d291ccd1bcf95f3bc757f20f6890f106e6bca5c0b6a61e5813b60372f2a5ce7ef4450423d365af880c69f5222349706ad646d7c97e5d0158f00efbaaa3873f38c034e2e3699758e3d2040ff08501e775eeeffbf0aba2f151a28373c6db76a5184ae6f2750cc3b131f4e951117f1b05354983e4fab6a995968bd55c4c353836ec6275f456eee2c121b2e3bd6d6f362ef"}, {0xa8, 0x11b, 0xfffffffffffffff8, "5f367e47572b1742a4e41c47cef59cf6f29e4cee2330dc84b319543dc9f9ba80148f9c4a2d2fabb28046eb80fee19dbe479a0dfae77ed149a392405aa4943bd344a3d6622889513554557e79a72704a96c48201637ef2d9feb612c1adfb05ac3251b64fb085b1c435e621c1afc46fed621b5b25dc03dc63513096ad29c5115301809969ab93ddd587bc0ff72d358bba99d3331e7"}, {0xd8, 0x113, 0x1, "2385f9626e404521e0b4f3bcac6a79d79a87fac5e27fbf04a4ad5bbbfd753f941396500d09923ac4da9e18913527b6ab8cc607c66f61aea134799a381c5d37bf528669004f77ea58af45d8aeb963f3890bf32bf3814c1f35df97b900014639b9b79c941b23f527bfd808e39b0331f40908c0f620210de5f3cdf43ecf82b08396bbf22aca39df07164bd548ea1bc37e41dc312a1996b34cd738eabf7416c2890745897a8c0464af626ee23cffe4f3828e6a84216298f5f71b2fbcb6aee3c442d13fad61c0a98affd2"}, {0x48, 0x1bf, 0x800, "c1ef3cba960f87e69cebb6fab18988008d448ce32b7a9e5c02528980436e8653c783204d0ecd37093697d9adcc663f514afd"}, {0x38, 0x0, 0x3f, "7d7ae599b00620e90e2b120c9b8c2074424f7872f45f8a9da5617b745d97d045fffd137087eeda"}, {0xa8, 0x119, 0xff, "b9e2fd89e2871d6faeb4e567ef9515ed3dba52ae3344671e80859a4e6b780c483d228639c208ba0c7912f4e6c99338f8b52c683176bf2a47a4d07c0c449a2f51eed14694adada37d1ed11d57c1b56ea152d818430430b498e0be1392462617d29045fe60dd38ec6a43e8c2c3639a45d514da2daf5efee457e1df4d233371619aca2a93376d359fff0c97ae30af5a956ef2b7"}], 0x2490}}, {{&(0x7f0000000500)=@xdp={0x2c, 0x2, r2, 0x1d}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000580)="2adbdab598c405cd6eaa24f77b1658206d86064db7c86c6b29ae992fedfe36307bb979d286df960096f704f60ac4dd6fccd95355874bb94b0f4674bbb5aff8152e9a7528c1c0fd8644dfa9835456209e3cd46d82bad6a5eaab200edcea8bb0f3d6c51be352c258b791ec362e09499d3f893ffbc73409be7db69acf1315c49fb3d7cf85e2256e1f6cd7f5f77e8699a95371b186ded34cae2590991a16adf3f40929cc9c9a632804456224362f2336e5fff4f22a00261918caffb5fd725310", 0xbe}, {&(0x7f0000000640)="9acc4736490609e4356f541e0565c6d21b177140e44b4ec14f2a9700d9de14aef905f745b03271f9e8a995391468e652a7ebee8df61d5fba055a5405e20d4543f24dc4423a0f4be89c5ce91907146cda599891637b88479fae5886b724a157f344675cea310aeb1cc917be2d1e3f08b4e1198dbdb8a1853c508d137df160c926c68bdcde88d9fdd7f271ef5911b24a9eaedee3ae158780a792ee77bb5e8cb777eaa0d4c20b20a328", 0xa8}], 0x2, &(0x7f0000006500)=[{0x70, 0x10d, 0x100000001, "09bdb1d544591c5539cca9b43d16ac7cb3dc413775749139fc4ba71584e038dea75ab2ac1a6c3d4c5c444f1c5a718d2facae732038865ba8d9701961b187a1e256f395689e4ea3bb804e606b3649643b9f03c1beb87fcc22545171"}, {0x108, 0x115, 0x7, "9a9cc3d5e2d316b647c32fb591e36efcce141eabfc6b70ae749997884ab4fe195e2e19d27b7898cd03c01e3c1bc0973e46bf48cacf08a78d939957143dfb479b4041fbe7628f0ecbf92c2ea61c7f0ce4f886c4bc4f87a29efdcadde9166386e99573c699ae09e3faf9e9936b615616c96bbc13d2e434ad0ae0f8a6e20bd6a0aae10ecfd0dc26796376a7b4e2f62bcc89698d137efa3e7e38589c2e774a52c148d5f0e54f79c7ca377478f338f100c2a8df09378c22131fff3c89d0f88bfa51fced256da66797c0d0d644ddbf2387043601708ddb8930b1d1d6311777dbccbd4f0bc4364f7e9f8cfcb474df5974422ac372e8ece345"}, {0x1010, 0x10f, 0xa7d, "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"}, {0x110, 0x18c, 0x3460, "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"}, {0xf8, 0x10e, 0x81, "c460e0a56368a93a22a4e18b86172678430033dc4003371222740417d778641a9c348f4664fc358bdfdb325a781184ee96b690741c822bb2be9852acfb936d3ac4b42116a5177a51c629dd04c66dceccdd4336ca70b799dfa0f673dc3dc64ddbad98bfcf3b49a03f36820a1636ee49d3f43338e7f22997ddf0a8a9953dc3c55994a3b041bff95330dde24702cdf9ab2713fdaa3f8a623212219ad7f47cf067dd9c71bb4410cc1c7fda2b63eb6b740d21c44d65951c64ead846270eedfdfb1447e077fa9f8a24021a02d6bdc22e63214b168c2c6258d3bf0b7b029dcd458d15f81e60e1f7f8"}], 0x1390}}, {{&(0x7f0000000740)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x0, 0x1, 0x4, 0x1, {0xa, 0x4e23, 0x8, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x800}}}, 0x80, &(0x7f0000000d40)=[{&(0x7f00000007c0)="274dd51201f3b0797059f0306ea0a93ab4c8c2fad3a5bf5aa37075d2dc7d9182851115d8252e56d2cdb398900fb5d7684c828188f73d44fc3aa94e2bfad73115b8183ad33769159d7fadd1a50cd9a6a1bfe6214fa45c4f8c23dbd47470126ed9b8c4a5462789cc903652adbe9aa8bde7345b8c9dedad7736bcd36cab7e4c1ec686ef91d93b6f3790f095c987be7e5671f1dd52207205d794691bf6bcff2464c6c00459356b4394eca02644e4b76562c14ad553dcfe00a6c91e693d481cec4063d200fa6d226856149578bcaea2face1da67911b64b8e", 0xd6}, {&(0x7f00000008c0)="8846bd062fe07e1ac2fd53342446dba74d1bc54ac4f3664f06c9457626ab4a7fa336ce78e28aad85a7bc79cbd80708fadc828bf1b333fd9478e49d3fc4d019abdb67dca64ced45d2b2294a937e0b88cd17563a32bc22f5eb2e4b387d07badceaf42bdb904392186b8494a4fdfb541b749fc3eb608a1d9512eda31aaf69c48eaf049c685b9d4dc323ea99dfe7f7084b2091169929922813f032156b6f058e93fe041e8a02d1722d9fce3a2c93618ab5fc0aaf1a443e1c590f272ec85c45866e7f3968bebbf66548", 0xc7}, {&(0x7f00000009c0)="43c81b9a15572e748a5fb06624c013353618b34561e54c4e57e161a5ed247de77577d5f523b98646dab9d7315030ee7fd5998553c289a39981fb0790eb82905157dd5a7bad0cdcd0263501cf6aa21cdc002af1e6753fc898315176274b390f11454714f4f1d8959c552f5ad98313643fe35fd79a4054b3916afcdec63e1245fd935eb7cfb1f2ce9a5ba3b18559fddd7e41dee8440d5589c5ede7415191328978c300061c14f1dc9eea6319454090d6b660706b7f3d3bb1eacdba2c", 0xbb}, {&(0x7f0000000a80)="e800a50d60e335e89f350a0804d8028be5e46c84a651abbb9663f316bb15ad25050b3b9ac5d85b4796942e40da39bfb02056326ad75dc45e4b36aaf17653d4724afa663172e3051b50df75986197242ebdd8609f18a8bef12ca3e59ccd891ee8655a5dc0e4447cb4930be8ff9f49d948b01ad522ef0cb1f72632c527d79db83fc2c8bb45d1164457532a57ff517981c9d4b0c35cb4efe5c80298d04b99c88f6ffb524843bedd879b83ad5097b43871208dec0f46eedd125a16ddb8416fbeac830ed2624cb5ec2fb811613365cafc6db723fb49220ec8973a388ca18a83309f1cfb31b3", 0xe3}, {&(0x7f0000000b80)="eb5a714e0fb2daa8a098fbceeee9ac519cb827ab16cdeec6cae84c4f813878737a19bd3ddb81ee29f5bdc885406ade798e104f7bdb57f54aabb4b43078eb902f1fc311d095b039b000db713d884254a2c34f73722571d3f2a44445c4542ebff3d263223796340f0b66c21665aad0f500930ab7b93a13e524bb0fc89dbf57a763c85007c6cd77c5e17a51fed1c9624e784280d21e0eba72cce8a783ddae36aca409bca64177044331addf6e8a2401cb3f957ec011e54e6599140a841779def7ca47143d8d", 0xc4}, {&(0x7f0000000c80)="be88a3a4326afb8920c3d4eadb8fb13ca15cee080263e53b119799a1f0968f72bfee9b03e46ce7a07875d251935c3bf5b67efe087bd8a49ebbd4730b5fc1a259eed3bbf9fb5ca54c9a04b4f3a2a086d925e1afa9411603de9d2931547cda71a772da2f2830ae58d3b8c82daa2839ba482d3c3abb5ce4f739906c5caaab1f8ddc4f478833f60f60309d85a889ffb8d701cbe28954343e8f5f68939fee5dd63eb713837afaa534bfaefd2e844df0f2c39553", 0xb1}], 0x6, &(0x7f00000078c0)=[{0xf8, 0x102, 0xac43, "b0a1f4352166a9531e5eb4fbdc888c7206805d396b8f3ba9bfd914015fe8f3327d08feb5478694700354f25132ed5817a3f7d9d4bb96e5d15be65d35aa47e589c8d2e2e4b69186b6bb74b8222ac50bd0a6edfd01f24f4005d457dfd3db2efb16e90c09dd2452f2ed09becc66176e2c2affb063be293dfde4cfc8fda892aeb4777f53afccd78d938484d70bdbaa5b6ae85dcf0e413f1a82d4368861433954bf4b466e9cb98704e0f0f73f0f0cbe492f53f6e8018a7c64440371da8fde8d04b6b5e46036047ef2bfd0cba5e94c35a3bd7c6b42bae75b34251bf8f7f799b29280a263de58431eeae0fc"}, {0xe0, 0x88, 0x3f, "7bdead332816ecc12971e0ec8b11b7d303255184413a38af1a19b789979d65d16c20b296c917302f49ab16398d4e77bee57cbf31fef9324b3a7332db9876c3cd53e4077967d4258c898641f9bedab95c83a4b19778db139f97498f6ca199906fa23c5ef44e06c33a8599efa68522a4bfc76440c78385a776ed8d4efbe3be6ce9b714d1f7fba9afff436b5a9fd9096e3b87c0f47d93638fdae2f7f747c981046b28aacf57db98c164035d5c19f28c0101783dc83b46a92063f1f576f51b394e71ff9fc216788a9830a59c"}, {0xd0, 0x10c, 0xffffffff, "d5c26dec1983bb34b3eddb0ea81dae9344d604aaef8e929137643d168ca8cf29cfec9997208cb761510c1f6e46fc87092e74372576d237e0b124ff79d4b166fc56c114fbe3b90d28c6cc13b8fa5fe1f09ee5e3cfa8f607d020d05be1cd51501c71a030e721ade11c17a3acfc74db27c59de79021782a465e13706802139204a8eb22157e4c1b95e80c9d75d08e58db7fac1ad661d735781c428dc59108e6b113adbabe170e2662ac067fdd2a569fea875c9aa8d6d6818079ecbc"}, {0x1010, 0x12d, 0xc66e, "e343f71ea5c6d879c0c5842adc81109b63e921b93185124f50e48ec8682dbfe08903f3c87ece109e88f33f1ff08cdf28432b965291af1f3756ff4714c95c08cf52b9f6ab6f00ac83d26bff9acefa3a8762bab39c3ca1336a4fb2af055977ef6046a67d310f7d05b13130d3ecdfd7fdd0edc6a67327ed7f493d81f66ea5262ec9b3ae7bde19b4d7d6e5a0a200996ef289fcd092aaba2fad958832187266727213dab8b715f26c48136939e279a24f44fa6fe6cae755d84880e8ecbbe67eac422edeec47af46ba1b95ad4b875f39a7a79fe0a19b21129a16b85b35ef1960cc158214fae6439fafc944dc046a2d48b3b124c4655aea889de4b9a7d51b08b21af63cb9100639b70f1620dc2687732a814cfc2e67e7a8b51ea1ec18580e14967e1aa00a062580ae808bd589d67e7d6fee4f649f5067348f0154b71576818d1bd44a4c12fa3f67498d58cf369a6aa2b3a366770ada79eb2802633c5db562f7e2987c3ef38a6482f41739f5cf530f0b1f4c04f161bee3456c56262514222549e2fb114c41ed656989a077187ae31e2778c3152896212098bbd38a9a43d2b926bbce22e0640b79af594d73839a3221a704f7aad751f04460e41c3c35ad01596e3103a1511ade2dc76f5f06bdb70d628e1e5e5e672d57c1f9154211dda9a92f406c626d73b3989bfa030339fc9b2adde62031ece6ddf5c73793bc216974c326180f64cb54d0c1da36114d3acc4ac94e454f112d67a5bb23983e5ffb38365a73a209138eea72fef6408435cabcc27a2f448cb2c1a8669c0f0b32c22d4694a0e4a4e01cf4cf42caa7061f175dee5feb4d020d94c0076e4337e8aa44ddf5d068cb2e14f67449ba01f91eb1017b2401e2df3f79f233df2714449608076689d95d1c7838de2d8ef4558661137cf4af19544116d6c1235477d840f718a9d7ce17c1f7e783819368e18ccd8f9967565d06426c8820f556849a18a7b5508cb8c33649387b1ff458f07dce2153ddeacd6d6580ed39462fd48f17c15154b4eea9443fae7c08b54c271215a935daaeed18f67d4ca9c9af5feb694445425629b098c12fb49d43599244c69e940bbaa4dccf8aa3573cc867535f3a3b9ba82f0e5ace23b806afccf2923f0b53ec6b695359f4a884bdb9ac4ab0b36e8b0d2008da9aed25f2b2938f10a235d6a24cdfaebbfb060a4afecd2c589140b8359cb42fa303d005c47bf4ff1c03d07a17757deef8c164b91b58dbf5b061f3a3b1a1a9ae3c53ed947c10f776be94933ee64d95f31794ddef5f57db8b668842ccde5c8a1663673309269be15dea200e354eb7408a8471790d688264ab8ae9f89d425a78f592fda4b413693a4f209c34490fff9a9ccc8a818717465457c724e5baaf61148da90410e28f8bcad034577b167d7c2adbf42c0623275dd5f4ccca75bd343541f1ae38875bc937726497d13f5074bef49ca39d3433f3505ca23b036a96b7e3f5f0d7e0127d8cfcc66ecc09a479186862188e151786311b94cd2b50f96c6314e581ac64369e52b3fe260eb72466062707230b13978850d098b3c1fd8812cc6a84736adc647bcd7016dc9123e611790fd2c67dded01bce12c143104a6a75363a0dbb4ef3fa9a148efbe5093e4b65a2a7e22de30610af0eac5584287f3cf9daf559c7b544da718f44fcbba75a5885968662a92dc05693f5739eeef1ab287c7986a0eace6166497534b078a1ff33b29f3b7929f60e21a697f3a9b342547c5c5e5495a3a333145ae533be8d36f5b2da0f36c2270a9eb32936d1a1a09257acf3eebd744284ccfb1ee51f4459755f32574a01c5da5905968d9e36bf935aee56d9681c7345285c606b7c2ccb7c9693f4e764d836d2daa44d77fd7a360c9da098bc3a6abd170737595634ad24491a52620f1699ef946ec55bb3eafb7dad86fa2069ac497d31d4a4d4c63dee13f14606c327a7d72428503a6608d20a397e30f05e21ac223fe1204b0189217edeb3d64f56be62a1a46114439c7e57ce3b4595bcacd673c2b0bcc8d12c0261a23c65265e55df46baa314c3bb4e24705d71554de8138d214bb606adfec61b0fe973bbf2c12540f2f67498ab321b82a2512a60da95a2e55449eab57de4a29eb78e696748d59362a9f347ac37802274b2c0bf241579c290369a4c258f3ea8dac5172e8bc1a08dfaaa2e47f8b4fdd964a149cace426dfd75b1c2f658d7fdb9aaf6d985df308f3866d803b840cfa9e377b1d18493a07c4da3487866e0d6ea87dc02c84a6a6419b716396545b2430e5a80b309a2f0148f109645578a9dccf52024ea5d60147fc54a9527a0e521ce09d7c81799914ff5b09c7b0a9cc8fb0862b7f20598780587d56a77890e3acdf638d132a4b64b0903cfbcb9d3472350c64be1ee3255f54afcb922b3fe7ae6bcd0605a7dd2fa55fd62af702149cb2e0ef027361c95873a027933f98d9cf31133e47d19952dd02d84055d375c7a00b2c28ca5cd30119d36339f25fb448c3677cebc8e94b14b0c1392e685cf6d5802bbfcf111f2b2b8af7c677f6dfe591799447ae6e6d19d4e63061f37ea1d07804b19165a1b474f9851c26ccd751f9cb12beced66f9a3519d9f8dc834aceb96bb6ea65c74e304c9ab6f5ebb8952575dd90ba0717e8a14beaea469dcc2100ca6d3ada8ca7e3f2c3fa0f862185047e65a970a32e3a26383bf5aaaf0ba03d59fb3b29be60d7d2f7454f4e31528e2ea980054416fa2a056dab56d3ba416a62091a5e1462641054f8f05e0c9ff655c66dfd253c3db911521fecceaaf037b441d22cefc7babba61a427976be6ec9b0326d718f96ef37f4957300826ce056bf3d854a6afdcd5317fe6063a130b8303d45c1b99fe1f61c605282425fe4de2ccef4bfc6e063df2409fe890f65387713af03c641628fc167eb8403662102a04c94f92fb20a4cd9ff278ad01e186c11ef8e15c2a0ffef5e3c449769ee9a1c2b29c016f5a74e59ce069d209975ae00607d59dc70f958a021bdddd9657b6896a9474354be38df7263130af2665d9d6dc302b7d4f0ab7d51ba55cc758a3cd896ac6a5864dbd981d8e620ae15c0d7a99e089204a3b3c78b66adcb5b761a725257976b5a4308de179bb22468d2832dc7db7a5092f5d36ca0a26f8694f60d0430f83ba14f56dfd242ade60a8873646e9294ac482408fb24a6fe29c79c4386c3e31fc36e24ca0a2e2b5c16afce1014a35a19fd48d405d4fdeb5eaaacb6a5119abf05e1587d39116efe1216f2711e717567bf397de8611fefae9edf9c2a0fa6563f0a985d4e9605eade1560a07a6ee5ccce94b2c7efd491f9814b501837092422eb1b346235619b8a50fb0b76f6a16a6af86d8f551c2fdb4e7aa5d6a9cf866bae266f398ed5a6d34679745ff0defcf49106506d113e234a4fa273ba0181781c4b33cdcfc67159a578b02ee3200780fa73b1f4bd6941ba6ea6ec3097cc90384aeaa1926a8becd35d1f7e65cc75099bb2a529484340008fc8d67ed1a2ca0d1a2e6e081e79467193b030a77b3f077a97ca0703b729b0a5bdbc8952f5dc1030c0af6a1931905c758df4264e555f019a9388d6121462418cce4a1f62324640a52bbb6b77046b57aaed1033025db2caf1af957fa74f0c472eeb26469b2bdb2854910b301057e6edcfba9e0fb7694a75b67c791d14add4589fbc179571bd5d5545ed6f7839befb6205651efcf74e9e6806a76cc553a35b71a8072b2b6c47177bd988e3ba4fc69a5e59dbf6cbb259d9d0a85895c0e6ad82d882abf835d63aec3b84e25325a3a6acf21a6de5448c8c62e19c519624a755ad5ddc43faa5680e5b37b7616f949fed2e8d803761ad00aa4734ed29bdf8eb121fc4685dcca5cfa023aa4e7f071b3bd28f9694beb8a858d1e4adcc7367bbcbdb11211b724f2d9261d0fb8cf4c4a29db011721581873e5249267a3601a848f811d3a4f039457f9cfc10ba77b505db3da98fcc9495ac51ab1456af2328598346e164fe4d7e59c0e571e457b0feb3c667d2f04b9e0ecd68e47136639bc90fadd4bca01af6caef350de130e6c94d406c3ce80bf91299da32e1985d2b755a90b99226f7df67da630a4b91eb450d28322bdb450bd8aac966194d7349989a4afe4b69894472bf69cba55a81f603d04ebec4db7efac17e9886c65b46eb66aa7abf21ca566e8cd6bc67668fdc9499eab074714febb7e2cf67ce4ba0638551d911cc58022f324aad5b85ec42d75406bb58d7e4682490f56b4ba4462a1fa0f29733000d7ba8f3cdc9defe6b1c12d37615d8ce9b899b91827ac0fb0f4c7581d87c877876a75b19533c7428737efa05b6b280fc49eb62adb0784d58c3e559611a463a5a3f2380e9805c6d6c1b334dee63b941966191b037d681fdbef14c14895eef8b05b77d918396095a88106ec09177244b3318df65092598faf12d9a5cf2cb8a421352809f3998c76ca93c7527d9025730b607cdfd7e92bc881d7557fe5cdcf4a297d97ae78c2ab3c10ff14518ab9e39a58b0ea35077043d4d79830ea507ac70596bc372afc78a8d862e0883b8ac315409e2e8d0b5b863f1f5a95ea52e44ab415785c8249b5d6fe9ea933a82b7ef6edabcdc1c2e9c7d8c16941738361ca80c6f4119be81eafd139153817a81165b25e4fa58b3b4289b1e2baf237ae77ef47fc7bc0d65f136f96dc67566530da7ad3949dc2c0853d5d8a99a9e11392db62ef2e06079e75bfb27160e44f318641903af895d559601b3278e3f0505c4ed17fbaae7210d523cb2d14358c12b41631d001653a43d93779f13a9179098ea59853ac788cc943b3aa31a095eee7a8e19ab176a80801d40fc006bce2e63ce5450cbd6fc3ab0c40cf922ebcc111648f2e73c461ddba8690fac6b232a397139f4728b7c476739435fbb436b7ddf1c8277643f9bc0e9b0c598ab8ea8ea2457b90f90e0d4118be4c3751fc895204e54fff4f0906351c37373510d306408395003d0bddc5079b9c90835a5631f2cf5e23971ba3c10884b1e15f53d8cbc7bbc2829dcb17c7cf590942c130a12a571ca8315b3477c18df204c2d4d51b929b8d594c116b692f9865b06342e27961085f5207a641071ccea5bb844d20bfce09251a28b2d28150b9ae2996ac13f0570f16d3d7011d7c09e1183a5cc86fdde355c1443c077c6e4f58cadcc1ad4fe80f2401d401407d46f4bed4875168f9dd8638256a7b25fd78ac56da4dabf40d1e590b83b9a7ef1a24f3f903dd11265cd21097db9c0178507709b25a8e16fe69130013c84b19198b503f2a092aa4212c4c4790468c03a1cd4570b16030d134637d5276046dd943e3769f32b5241fc81729e5b51a86bca47f35d7d67f45b5cfe38996b27c9394148f9696a8a1f34d7bb862c774c7a7f654816c1e890e1b6d18895051739f1da20bd956dadc10f837cfcd8c286a76773e1bad19c175a26a60451e8bf29139378cf53ce9601d443272262ca9522371a1c58b070c88e2c2b6566d6cd091081e5d32d1c33833ae0954b4d1ee9da13aca080a85790cc3055cd911bbdcde74c0bd18a96de1f642e3f68c9d47eaac72a9cee3e8931ce03622c5dc25c727ab4fe61c749b02668db3a5ecafa60c0f3f973dfcd316f6c099dfa16b14b335f18ae74524ee5117aa21796eed9d684d785b4d928dd1d9beb2dffdb8b6d26d58cc5decdc7e2d34e53b7ebc18b96205e1f56a3a345c40521e4fa0e662ddc164ee5b45e5a7c67e15eb184497b49006d5af9696bc39499032db3c465a0d1b35294930ef19a5668fce6d977a282c251a75f8d174def3b91bae9b19e697f29b5d3088cb56de2d4fc5768e24"}, {0x88, 0x114, 0x7a, "98d202f1fbbad4b6cd7d5d9c22819538e12fc9140c94a416aa4538974ccaa1fbfde88a088cb84b15e57319f4bee3fb633ffd3a9ab60a1faee6d66f790119092915d7118fa7945ace80c14cb4d2fbd589299b39aedbdd492a4686f6b4740145266e83b74761ce825bb9fd674ead10d4d53372ca7b"}, {0xe0, 0x101, 0x40, "85f979434aaf4ab736887f4f668e125705a79dd240083a673653961246fa53325ee8d59665655612ff4e76bdee042f6c43439ae940efe7c0c16bddc144c7f6656321f6f142a7043fc396aa848463aabe2c7c706338c0575595777f5f316a309cb3082b895cf64ed87623ebe260925e9212b8194d17ba2647b2b10cf8b30c6af6c3fb8acd2362a984fbaed74808bb4e032e69aa92ef074f6f2f45d263c978e9b94d4d53232802bda0fa96ab376a6dacd554c2671884ef1be3719c836a3521171058bfb03d206b65cc72c900b339"}, {0x18, 0x29, 0x9, "80fa2a146f2674"}, {0xe8, 0x11b, 0x200, "d23316eaa7b66651b683544a569ea119b51b594e4036cfd7d0ed82b90186959cc033cfd7c4c8dd70cfe7f63564a9314d324e212f373bc962ae66cf6213853ab287e2fcbac0128dc1450c726652978c739104faf00522e505fef325d94ba8b101af95dea087dc8fe48fabf57d9a102837555e215c9d2a352736a51824b38253fe8d654f6c1b6f21e5ec61d74443b1584823b2b1ae33f81bf70f7ba8818d9759d276c9f8823a5ab01bd4f8123f1ab7e721d83b968b4a8977c5c818507f5e48ea38f298e581347679783d9dfa8e14d88a64531808"}, {0xe8, 0x11d, 0x1f, "30abb03cc5a79c5d17c0dc7df13d3e26ecad3ed168f033e9a78fd4fd57c636f1bbaca2905b4a30af14a8defccfaf64ca75ce31ff75af431f9dcc68c7644a5c8414195b5789dbecd9f77ed459287a88aea6ea49a6e8536f72ca9e68b881187c2d23bc78bd68e517a7acd9ac5659c7fa3bf8ad517f7207735b44a1c56fcda1449d4766386dba8119c1cddb1537ae2a513b62a463649a001fda93d9622b051a5f8fc568b527033afc752f710d4e7749959af8e098ae54f006864b4374d793b96f474c531ff4f2cde25be6f73c6aed6a589d9a6d2e"}], 0x1608}}], 0x3, 0x20044001) [ 934.068810] audit: type=1400 audit(1560471349.430:5663): avc: denied { write } for pid=20254 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) 00:15:49 executing program 0: r0 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setlease(r0, 0x400, 0x0) fcntl$getflags(r0, 0x4000000000403) [ 934.512100] audit: type=1400 audit(1560471349.870:5664): avc: denied { create } for pid=20254 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:50 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000000b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0x3, 0x4, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rfcomm\x00') getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) getresgid(&(0x7f0000000100), &(0x7f0000000200), &(0x7f0000000240)=0x0) r3 = getuid() write$P9_RSTATu(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f0000007d0100009c6a00040003df000074010000000600000000000000000004000200000007000000ff030000000000000b0073656c66276d643573756d03005d26261a00706f7369785f61636c5f6163636570757365746b657972696e672425000085944331b491d07bc4bf07d7eb554cf18d084866", @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3], 0x7f) futex(&(0x7f0000000180)=0x2, 0x9, 0x0, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000140), 0xfffffffffffffffe) 00:15:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) 00:15:50 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f00000000c0), &(0x7f0000000100)=0x8) r1 = dup3(r0, r0, 0x80000) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) setsockopt$inet6_int(r0, 0x29, 0x20c8, &(0x7f0000000000), 0xffffffffffffffe3) 00:15:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) 00:15:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c8e072a73705f69643d6ee6f7dda71ba2233498896000d66e8c7671b1ffbbebf7b2ab1a7ed439ccbd9bfc2a9846477de09aa273384f75c0bfc045d72cc98647e251b16d3a128322f1f7", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) 00:15:51 executing program 0: fadvise64(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffe) write$P9_RCLUNK(r0, &(0x7f0000000200)={0x7}, 0x7) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[@ANYRES32], 0x4) sync_file_range(r0, 0x0, 0x0, 0x2) fallocate(r1, 0x0, 0x0, 0x2000002) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x8}) 00:15:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:51 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000140)='./file0\x00', 0x0) write$P9_RREAD(r1, &(0x7f0000000480)=ANY=[@ANYBLOB='\x00'], 0x1) fallocate(r1, 0x0, 0x2, 0x110001) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x0, 0x0, 0x1a0ffffffff}) 00:15:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000003c0)='/selinux/mls\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00') accept$packet(0xffffffffffffff9c, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000007c0)=0x14) sendmsg$FOU_CMD_GET(r1, &(0x7f0000000880)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2024000}, 0xc, &(0x7f0000000840)={&(0x7f0000000800)={0x38, r2, 0x10, 0x70bd28, 0x25dfdbfd, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @rand_addr=0x2}, @FOU_ATTR_IFINDEX={0x8, 0xb, r3}, @FOU_ATTR_PEER_V6={0x14, 0x9, @rand_addr="47f26dfcb9d8647c9cea3b8c2a4290df"}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000001}, 0x8000) 00:15:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:51 executing program 0: r0 = socket$inet(0x10, 0x3, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) inotify_init() ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000100)) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x10, 0x70bd28, 0x25dfdbfd, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000804}, 0x800) ioctl$VT_ACTIVATE(r1, 0x5606, 0x8cf5) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000003c0)="24000000180007041dfffd946f6105000200000a1f000007002808000800080004001100", 0x24}], 0x1}, 0x0) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f0000000080)={0x22, 0xe, 0x2, 0x11, 0xa, 0x1, 0x6, 0x22}) 00:15:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) 00:15:52 executing program 4: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000001c0), 0xfffffef3) setsockopt$inet6_int(r0, 0x29, 0xfc, &(0x7f0000000000)=0xc11, 0x4) vmsplice(r0, &(0x7f00000003c0)=[{0x0}], 0x1, 0xe) [ 937.092675] audit: type=1400 audit(1560471352.450:5665): avc: denied { create } for pid=20326 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 937.198722] audit: type=1400 audit(1560471352.560:5666): avc: denied { create } for pid=20326 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) [ 937.200910] audit: type=1400 audit(1560471352.560:5667): avc: denied { write } for pid=20326 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 937.282571] audit: type=1400 audit(1560471352.640:5668): avc: denied { create } for pid=20335 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 937.291608] audit: type=1400 audit(1560471352.650:5669): avc: denied { write } for pid=20335 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:53 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) truncate(&(0x7f0000000000)='./bus\x00', 0x1000) r0 = open(&(0x7f0000000480)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x40d09) 00:15:53 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 937.676428] audit: type=1400 audit(1560471353.040:5670): avc: denied { read } for pid=20335 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 937.721333] audit: type=1400 audit(1560471353.060:5671): avc: denied { create } for pid=20335 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:15:53 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$addseals(r0, 0x409, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:53 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x200200001, 0x0) ioctl$RTC_PIE_ON(r0, 0x7005) bpf$OBJ_GET_MAP(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000100)={0x0, @multicast1, @loopback}, &(0x7f0000000140)=0xc) fstat(r0, &(0x7f0000000240)) fcntl$addseals(r0, 0x409, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000080)=ANY=[], 0x0) splice(r1, &(0x7f0000000000)=0x4f, r1, &(0x7f0000000040), 0x6, 0x3) 00:15:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:54 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='mountinfo\x00') arch_prctl$ARCH_GET_GS(0x1004, 0x0) readv(r0, &(0x7f0000002340)=[{&(0x7f0000002380)=""/4096, 0x1000}], 0x10000000000002c7) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x30) sched_getaffinity(0x0, 0x8, &(0x7f0000000340)) readv(r0, &(0x7f0000000580), 0x3c1) 00:15:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:54 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x3, 0x7) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@loopback, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@empty, 0x0, 0xff}, 0x0, @in=@empty}}, 0xe8) r2 = dup2(r0, r1) write$FUSE_DIRENT(r2, &(0x7f0000000000)={0x78, 0x0, 0x6, [{0x3, 0x9f2, 0x1, 0x200, '@'}, {0x0, 0x4}, {0x2, 0xaa, 0x11, 0xffffffffffffb877, 'GPLkeyring+vmnet0'}]}, 0x78) 00:15:54 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000540)={0x0, @rand_addr, @empty}, &(0x7f0000000580)=0xc) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000005c0)={r1, 0x1, 0x6, @dev={[], 0x25}}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r3 = geteuid() fstat(r2, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f0000000240)={0x90, 0x0, 0x6, {0x1, 0x3, 0x7e3, 0xfffffffffffffff8, 0x9, 0x6, {0x6, 0x2, 0x8, 0x3, 0x2, 0x1000, 0x3ff, 0x7, 0x40, 0x81, 0x2, r3, r4, 0x8, 0x7}}}, 0x90) read$FUSE(r2, &(0x7f0000003000), 0x7c) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r2, &(0x7f0000000380)={0x10, 0x0, 0x6}, 0x10) 00:15:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x40, 0x0) socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f000001d000)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000680)='./bus\x00', 0x0) epoll_create(0x0) perf_event_open(&(0x7f000025c000)={0x0, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket(0x5, 0x7, 0x3f) setpriority(0x0, 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={r0, 0x28, &(0x7f0000000080)}, 0x10) keyctl$restrict_keyring(0x1d, 0x0, &(0x7f0000000200)='keyring\x00', &(0x7f0000000240)='/dev/loop-control\x00') execveat(r1, &(0x7f0000000140)='./bus\x00', &(0x7f0000000400)=[&(0x7f0000000180)='/dev/loop-control\x00', &(0x7f00000001c0)='md5sum%\x00', &(0x7f00000002c0)='/dev/loop-control\x00', &(0x7f0000000300)='cgroupGPLproc\x00', &(0x7f0000000800)='\x00', &(0x7f0000000380)='/dev/loop-control\x00', &(0x7f00000003c0)='keyring\x00'], &(0x7f0000000500)=[&(0x7f0000000440)='/dev/loop-control\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='/dev/loop-control\x00'], 0x800) ioctl$RTC_AIE_OFF(r1, 0x7002) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000040)) link(0x0, 0x0) geteuid() seccomp(0x0, 0x1, &(0x7f00000007c0)={0xa, &(0x7f0000000740)=[{0x7fffffff, 0x3, 0x1db1a983, 0x8001}, {0x5, 0x4, 0xfffffffffffffff7, 0x6}, {0x9, 0x4, 0x2fc968df, 0x5}, {0xff, 0x0, 0x631, 0xeb}, {0x4, 0xffe0000000000000, 0x1, 0x8}, {0x3819, 0x0, 0x2, 0xcecb}, {0x3ff, 0x8, 0x8, 0x2000000000}, {0x7, 0x80000001, 0xde95, 0xff}, {0x7fffffff, 0xfffffffffffffff7, 0x4, 0xffff}, {0x3, 0xffffffffffffff81, 0x10001, 0x9}]}) getsockopt$EBT_SO_GET_INIT_INFO(r1, 0x0, 0x82, &(0x7f0000000880)={'filter\x00'}, &(0x7f0000000100)=0x78) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000980)='/dev/loop-control\x00', 0x101400, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x3) lremovexattr(&(0x7f0000000840)='./bus\x00', &(0x7f0000000280)=@known='system.posix_acl_default\x00') ioctl$LOOP_CTL_ADD(r4, 0x4c80, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000900)={0x18, 0xd, 0x1, {{0x0, 0x4, 0x8008}, 0x3}}, 0x18) getsockname$packet(r2, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) recvfrom$packet(r2, &(0x7f0000000540)=""/246, 0xf6, 0x0, &(0x7f0000000700)={0x11, 0x1c, r5, 0x1, 0x2}, 0x14) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) write$cgroup_int(r1, &(0x7f0000000000), 0x12) fallocate(r3, 0x11, 0xfffffffffffffffe, 0x1000000000000003) 00:15:55 executing program 0: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000240)={{{@in6=@loopback, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f0000000340)=0xe8) syz_mount_image$msdos(&(0x7f0000000000)='msdos\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="e9b9d2b9ee4c4ae358bf8d99269f5fb16b4cc082342c09062047cc84a48e6ad145709b17728c0b1ab905242764da6d40a97046aa9c28f224c40d28175fb126e7a13e40b271e0301eb52e3a25a0fb4a42780cb4563324e38b4645207c46fa04454fce02b8c832918dd95807cf10544ac189193a2a336fedc288d16f623adefbc8e7ae42ac2279fdbb8124bd3cd02c012cf58cbd42", 0x94}, {&(0x7f0000000080)="715bddd9bf2a93d808ed270cd0750ca1ce1e12cca8c44ed7242bd2553201953abf37595fa96e81b84a87486b66819074011e3846cf37c9aba0e9f3c97bd48cf1959398120c4781eca29410aa1c6d14c6a1399854980aeffa7dbbfafb45572a824374970c07", 0x65}], 0x8, &(0x7f0000000380)={[{@nodots='nodots'}, {@dots='dots'}, {@nodots='nodots'}], [{@fsname={'fsname', 0x3d, 'ppp0\xcf#+'}}, {@subj_role={'subj_role'}}, {@obj_role={'obj_role', 0x3d, 'vboxnet1J)ppp0{].nodev^em0{^!eth1)'}}, {@appraise='appraise'}, {@obj_user={'obj_user', 0x3d, ':'}}, {@smackfsdef={'smackfsdef', 0x3d, '{'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@euid_eq={'euid', 0x3d, r0}}]}) r1 = socket(0x800000000000010, 0x8000000803, 0x0) write(r1, &(0x7f0000000100)="220000002100070700be00000900e500020000030000000000200003050003800000", 0x22) 00:15:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:56 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 941.183457] FAT-fs (loop0): Unrecognized mount option "fsname=ppp0Ï#+" or missing value 00:15:56 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f00000000c0)=0x4, 0x4) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x8, 0x9de7, 0x3b, 0x1f, 0x0, 0xfff, 0x40c1a, 0x3, 0x6be9, 0x0, 0x7fff, 0xa4, 0x1, 0x8, 0x400, 0x101, 0x39d, 0x10001, 0x101, 0x7f, 0x7fffffff, 0xf800000000000000, 0x3, 0x1ff, 0x1, 0xfffffffffffff800, 0x7fffffff, 0x2, 0x800, 0xb5, 0x7e7, 0xffff, 0x0, 0x7ff, 0xb22, 0x5, 0x0, 0x8, 0x0, @perf_bp, 0x8000, 0xfff, 0x100000000, 0x0, 0x20, 0xefb, 0x8000}, 0x0, 0xf, r0, 0x9) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) 00:15:56 executing program 0: r0 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f00000000c0)) ioctl$sock_SIOCGIFBR(r1, 0x8940, &(0x7f0000000040)=@generic={0x2, 0x3, 0xc74}) ioctl(r1, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") ioctl$ASHMEM_SET_NAME(r0, 0x41007701, &(0x7f0000000000)='nodev\x00') ioctl$ASHMEM_GET_PROT_MASK(r0, 0x81007702, 0x0) 00:15:56 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0b") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f00000001c0)='gretap0\x00') removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x100) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:56 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:15:57 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x200000000000011, 0x80000000000003, 0x8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'ip6_vti0\x00', 0x0}) bind$packet(r0, &(0x7f0000000000)={0x11, 0x0, r1, 0x1, 0x40, 0x6, @broadcast}, 0x14) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000380)=0x595, 0x4) sendmmsg(r0, &(0x7f0000000d00), 0x400004e, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000080)={0x30, 0x5, 0x0, {0x0, 0x2, 0x7, 0x8}}, 0x30) 00:15:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:58 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:15:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:15:59 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x4a080, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080), 0xf6, 0x0, &(0x7f00000000c0)="5a7118aba023cfe69ecabeca9499ecf2fc5caa50e1611fc841632427a8c46b2f4bea27f25afa10f1bdba4d8a3f5828b2ed210eb0c25c76588d13d3b7f7ea926e514c02995c5b6d9595afbfb25228bdc8d0e958fed10dac302ba752c87df794a81b860cdd0bea29c32dc3279fdee4e3bb5fb0b7272bd1d09b27c7e731930dde95d9a751630845d9545517a53f43e9b1057951a1b0fd44b136383bb1f01afdb0a72b037adb02b3cead5b0b0756f298104ff44f031c20e6f471bc0df70ceab7e0cf10df18db3e4fe9235ad2b252059a3821f2b20273146bb2c8ab3294aec90cd317156f63a1c18f65b1db8fb3fced79532a5d88ce9eafdd"}) ioctl(r0, 0x7f, &(0x7f0000000080)="b2688a23e4a1") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x5452, &(0x7f0000000200)) setsockopt$inet_udp_int(r1, 0x11, 0x6f, &(0x7f0000000000)=0x7fff, 0x4) 00:15:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7b") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:59 executing program 0: r0 = inotify_init1(0x800) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4217, r1) waitid(0x2, r1, 0x0, 0x8, 0x0) 00:15:59 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:15:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:15:59 executing program 4: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x42, &(0x7f00000000c0)=0x5e7, 0x2b0) getsockopt$inet6_buf(r1, 0x29, 0x6, 0x0, &(0x7f0000000040)) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0xa3e, 0x8, 0xfffffffffffffffa, 0x5, 0x2, 0x3e, 0x1ff, 0x8, 0x40, 0x34, 0x4, 0x9, 0x38, 0x2, 0x6, 0x7ff, 0x10001}, [{0x6474e551, 0xfffffffffffffff9, 0x1f, 0x6, 0x9, 0x4, 0x100000000, 0x7}], "d7426409044f533768180403dfbb22dbd8a6ff6904ba513c65fe9dcac00e0dc4cf33947eba6b1384225e1247936060037a748bc6f3f33a3442e3207a911a649fcec223383083f4211ec83e53ec7711c4123d4c5fe7b0f8000010d91f00ec427426a871177cba7c174593aac2c7d9cde9780bad3d293e", [[], [], [], [], []]}, 0x5ee) 00:15:59 executing program 2: r0 = syz_open_dev$mice(&(0x7f00000003c0)='/dev/input/mice\x00', 0x0, 0x40000) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000400)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='fuse\x00', 0x0, &(0x7f0000000680)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}, {@default_permissions='default_permissions'}, {@max_read={'max_read'}}, {@max_read={'max_read', 0x3d, 0x7}}, {@default_permissions='default_permissions'}], [{@euid_eq={'euid', 0x3d, r2}}, {@fowner_eq={'fowner', 0x3d, r2}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/fuse\x00'}}, {@context={'context', 0x3d, 'sysadm_u'}}]}}) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) rt_sigreturn() lsetxattr$system_posix_acl(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {0x1, 0x1}, [{0x2, 0x7, r2}, {0x2, 0x5, r2}, {0x2, 0x2, r2}], {0x4, 0x7}, [{0x8, 0x1, r3}, {0x8, 0x1, r3}], {0x10, 0x6}, {0x20, 0x1}}, 0x4c, 0x2) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:00 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ptype\x00') ioctl$SNDRV_TIMER_IOCTL_STOP(r0, 0x54a1) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) unshare(0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) r1 = socket$key(0xf, 0x3, 0x2) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f00000001c0)='security.selinux\x00', 0x0, 0x0, 0x2) ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r3, 0x40086602, 0x400007) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) close(r1) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0xffffffffffffffff, r2, 0x0, 0xe, &(0x7f0000000100)='memory.events\x00', 0xffffffffffffffff}, 0x30) r6 = getpgid(0x0) setpgid(r5, r6) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0x20032600) 00:16:00 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@multicast1, @in=@multicast2}}, {{@in=@local}, 0x0, @in=@multicast1}}, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) fchmod(0xffffffffffffffff, 0x0) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000001c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffe}, 0x3) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000040)=0x36, 0x206) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) write$P9_RSTATFS(r2, &(0x7f0000000380)={0xffe2, 0x9, 0x2, {0x5, 0x9, 0x0, 0x5, 0x100003, 0x6, 0x3, 0x8dce, 0x4}}, 0x43) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, r1, 0x0, 0x28, &(0x7f0000000000)='md5sum/em1trusted,:++#&/^em0trusteduser\x00'}, 0x30) wait4(r3, &(0x7f0000000140), 0x0, &(0x7f0000000400)) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) 00:16:00 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be0") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = dup2(r0, r0) ioctl$TIOCSBRK(r1, 0x5427) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x80, 0x0) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x8) 00:16:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:01 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="7b9569603d0000fb0000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000040)={0x10, 0x0, 0x2}, 0x10) 00:16:02 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000000)=ANY=[@ANYBLOB="66696c6000000000000000fe0000000000db166f084ec30000ede1493c8b0699922bb89e699fb895ae6d2c8155205fa4ac211c4cdfd650354e5faa6c3ff0ffa32e381a2477b4ba066cb8255156a9aa2709c14560799d0a3e7cc87e9900000000"], 0x1) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000140)={'ifb0\x02\x00\x00\x00\x02\x00', @ifru_map}) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x1, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r3 = add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000180)="6dbc8d560998f7b984fa5a56f49aafe0cf20b837db2a915d4a0344cacfbf174f67855cc43aed389b41b7dfd2d707c38bcd", 0x31, 0xfffffffffffffff9) r4 = add_key(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="510b30ffd19ab3e597cca3836850489aadedaccca6d89599131876827c8344c6f7c78b14041da6c2753e489641f09b1291ea561ea9b6ba1537a9be7fa4aebbafa965596402bcc27bddf530ba5dbfe6e3775cbe3b5efe7f16c94c74df01426a1e28605d0f7263145ee5d88c693f987ff580f6774671cb4d8d102c3dece777139019e5c54a1d8d5ff4f48687", 0x8b, 0xfffffffffffffff8) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000380)=0xff) keyctl$negate(0xd, r3, 0x80000001, r4) r5 = syz_open_dev$evdev(&(0x7f0000000300)='/dev/input/event#\x00', 0x8000, 0x601) fcntl$F_SET_FILE_RW_HINT(r5, 0x40e, &(0x7f0000000340)=0x5) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) 00:16:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:02 executing program 0: r0 = socket$inet(0x2, 0x2, 0x2200000088) bind$inet(r0, &(0x7f0000000300)={0x2, 0x1004e20, @remote}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000000080)={0x2, 0x4e20}, 0x10) recvfrom$inet(r0, &(0x7f0000000540)=""/230, 0xe6, 0x12000, &(0x7f0000000240)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, &(0x7f0000000200)={0x0, 0x462, 0x4}) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000100)=0x7, 0x4) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000006c0)=ANY=[@ANYBLOB="2481ab4b7e3550a12b8a6f6dd2fac7f260978decb941aabab6694323c7e3cb44288b2d3efbf9c28a59cb28ea9a3a5d2c73799925b73c14992d75eeb59d270d98794e4dd8445b5a3ab9329b8975f32e19ebf5abfbd904625377ef9932aeb23ed9ee669cf25002ff7f1af9ee3e6b97e49b4c8f7da8e8cd1b02053c5cdd7eadb99057fbdd7cf96a757dea5f7ee180b634c3f2dab7b4fd064d3ce60a7789b5ce921129db4c54100479e155e86d5a6a5b6ab496f9c7157fbd1e7a79349707be2768d408f99f407c386f8ba0e03a13cbbd91fb125cbde3b66b81ef03bc272fba595bc51e713199838d0cee87ee013c973299c5ec4ad6"], 0x1}}, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000640)='/selinux/status\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000680)={0x3}) sendmmsg$inet(r0, &(0x7f00000001c0)=[{{&(0x7f0000000040)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000140)="850d249d30f043c2a7827b2e570c4a20ce29ff4da13d2d0e54b005eb7da459bafd336d9e311fa61417e8a17bd82236138080904b0f5deb44e19d2f4c0fbc6b39ddd299c6c0", 0x45}, {&(0x7f0000000340)="4a773796a4629f4966652f2e412fab2c94530b7f4e92d1d22845b279f0266dd381f9f9584c0847a952718804c197c08c5a3954de685a6bb68a9fcef4ca8a9b675cc243ff9de63024ad51a5f1c5090e277114c209087e9ec44c80658e0fb04e2f62f47254495688bf40692fe0e18f02426c61adafa0294e33d8a28f47d02a7b2015a67dfb47b022eadb08449fc60fe44cd79d350ed6bcd4fb5c4c667c1332e175175850319e96e5ab3692ff1474ac020ea12e5ff17a4eea77d663683b849a209460c2321b68d08097b4038395d08cc60c67d3c650e461f4d058e04192510bf9", 0xdf}, {&(0x7f0000000440)="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", 0xfb}], 0x3}}], 0x1, 0x4000000) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 00:16:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYRESDEC=r0]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:02 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000280)='trusted.overlay.redirect\x00', &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:03 executing program 0: r0 = openat$ion(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ion\x00', 0x422402, 0x0) r1 = open(0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, 0xffffffffffffffff) openat$random(0xffffffffffffff9c, 0x0, 0xca000, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) ioctl$sock_netdev_private(r1, 0x89fc, &(0x7f00000006c0)) io_submit(0x0, 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="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"/1607], 0x647) socket$key(0xf, 0x3, 0x2) close(r0) 00:16:03 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:03 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:03 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000180)={0x50, 0xffffffffffffffde, 0x1, {0x7, 0x1f, 0x0, 0xa00008, 0x0, 0x4, 0x0, 0x3}}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:04 executing program 0: openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{&(0x7f0000000280)=""/190, 0xbe}], 0x100000000000021c}}], 0x1, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x24880) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x9, @local, 0x9}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='wchan\x00') preadv(r1, &(0x7f00000017c0), 0x1d0, 0x0) 00:16:04 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:04 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:05 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x200000000000002) r1 = epoll_create1(0xfffffffffffffffd) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x1}) write$evdev(r0, &(0x7f000004d000)=[{{}, 0x0, 0x1}], 0x8e) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x0, &(0x7f00000000c0)={{r2, r3/1000+10000}, {0x77359400}}, &(0x7f0000000100)) 00:16:05 executing program 4: futex(&(0x7f000000cffc)=0x4, 0x80000000010b, 0x4, 0x0, &(0x7f0000048000), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000), 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x7, &(0x7f0000000000)='eth0\xe6)\x00'}, 0x30) sched_rr_get_interval(r0, &(0x7f0000000080)) 00:16:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', 0x0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:05 executing program 2: r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c626f6f746d9164653d48303030303030c02400503abed02ff7191537bd059ba9db9cad02b1fdebb7b03030302a303030303030343030", @ANYRESDEC=0x0, @ANYBLOB="2c853e6f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r1, &(0x7f0000000280)={0xfffffe82, 0x0, 0x6}, 0x10) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='comm\x00') setsockopt$inet6_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x4e24, @broadcast}}, 0x0, 0x0, 0x0, "01f68eb9fc5c67a85fcab367d73c1dd0c79753995f4aa7e8e7d5dbc40275175eac6d910280e26b82779a51771447cfb1af54b216718119f380d2438d6786384187bfbb9c90821bbb046cf435658c7fc4"}, 0xd8) ioctl$TUNSETTXFILTER(r2, 0x400454d1, &(0x7f0000000240)={0x1, 0x2, [@local, @dev={[], 0x28}]}) 00:16:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:05 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r0, 0x8001000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r1 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080), &(0x7f00000000c0)=0x1c, 0x800) getsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000180)=""/192, &(0x7f0000000100)=0xc0) r2 = socket$inet6(0xa, 0x2, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000280)='security.ima\x00', &(0x7f00000002c0)=ANY=[@ANYBLOB="050209000000003f00aac35a2c35fa46d759ac1878d4883234438dbbc38452f6a63ae9c54460d5ccccfe57eefdf55d17abf1032a6c8a9c5bd0c1aefc870b1d3b6e5969c8f381093e49b74f3f9d2553cc8a587ea857ea6f139fed83ba214c8d13434143b1297854118c381ba233b7c97e382c5ef2e71c3822fd2f65f5d02ce0dbe9848fcbfab6c6adcbd8021dea2ba3306d91e56b7f3e3463074bfb86c4b505df983e1c4e9dedb75fda8a0b4dc5975d1ac9f3175a"], 0xb4, 0x2) connect$inet6(r2, &(0x7f0000000240)={0xa, 0x0, 0x0, @mcast1}, 0x1c) setsockopt$sock_int(r2, 0x1, 0x21, &(0x7f0000000040)=0x8, 0x4) 00:16:05 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) 00:16:06 executing program 0: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000adf0dc005fba00080800000080000000000027fa01010000d08a2acd02fade7969daf3cdca0692000000000000000000000000f46c58"], 0x1}}, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0xa000, 0x0) ioctl$BLKIOMIN(r1, 0x1278, &(0x7f0000000080)) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:16:06 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008812, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$netlink(0x10, 0x3, 0x14) r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) ioctl$EVIOCGLED(r2, 0x80404519, &(0x7f00000002c0)=""/25) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f00000004c0)) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x20042, 0x0) write$P9_RREAD(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x9f) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(r4, 0x40044900, 0xfffffffffffffffe) getpeername$netlink(r1, &(0x7f00000000c0), &(0x7f00000001c0)=0xfffffffffffffd94) ioperm(0x0, 0x63d7, 0x2) getsockopt$inet_mreq(r0, 0x0, 0x27, &(0x7f0000000000)={@loopback, @multicast1}, &(0x7f0000000080)=0x8) 00:16:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x3af5b0e1235795d8) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = dup(r0) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000040)) statfs(&(0x7f0000000180)='./file1\x00', &(0x7f0000000240)=""/188) ioctl$TIOCSERGETLSR(r1, 0x5459, &(0x7f00000001c0)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:06 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) [ 951.577003] audit_printk_skb: 18 callbacks suppressed [ 951.577018] audit: type=1400 audit(1560471366.940:5678): avc: denied { create } for pid=20654 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 00:16:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/igmp6\x00') ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000000180)=0x7daf) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) write$cgroup_int(r2, &(0x7f0000000040)=0xff, 0x12) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x10, 0x0, 0x70bd2b, 0x0, [@sadb_sa={0x2, 0x1, 0x4d6, 0x2, 0x200, 0x1, 0x0, 0x80000000}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x80}}, 0x0) 00:16:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=""/199, 0xc7) [ 952.143510] audit: type=1400 audit(1560471367.500:5679): avc: denied { create } for pid=20654 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_rdma_socket permissive=1 00:16:07 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x10400, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400), &(0x7f0000000440)=0x4) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000100)=0x0) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000001340), &(0x7f0000001380), 0x0) fstat(0xffffffffffffffff, 0x0) io_submit(r3, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x2, 0x7, r2, &(0x7f0000000240)="dbfddde690bcf38a3b7ae9cd69878589d5077e21389e71e9379cea7bb27a1e152d5d2c5801e8dcae3e622386a7e9f14ae557bec10d431088d244b1f6f924847b9732a27a0c2aa83279056a947323f41294a9150ead65ad6339585a06fdf228a288baf366833b4c1f278fe13b2fae458472a7254eaec6eecb95f4bc8e23e4ea3b37b7b5299f0a0ac555c80a5920244103343f57237f671428fef033b233cd21e62fd8650211051fe285f3c012fcdf864dd0b633654a74889b34d427f3896a481c97a49e815c7d1d82d9deb3748284f59e90aeca860c405b6b1ecbc9c23bb688119a6d0efcb269b321a0c80403259df4a725", 0xf1, 0x6, 0x0, 0x2, r2}]) lstat(&(0x7f0000001ec0)='./file0\x00', 0x0) geteuid() epoll_pwait(r2, &(0x7f0000000180)=[{}], 0x1, 0x6, &(0x7f0000000200)={0x1}, 0x8) getresgid(&(0x7f0000006340), 0x0, &(0x7f00000063c0)) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:iptables_exec_t:s0\x00', 0x25, 0x2) 00:16:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000040)={0x71e, 0xa03}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/199, 0xc7) 00:16:09 executing program 4: ioctl(0xffffffffffffffff, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/full\x00', 0x10400, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000400), &(0x7f0000000440)=0x4) mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f0000ffc000/0x1000)=nil) r2 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0x4ed4, &(0x7f0000000100)=0x0) getpgrp(0xffffffffffffffff) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) getresuid(&(0x7f0000001340), &(0x7f0000001380), 0x0) fstat(0xffffffffffffffff, 0x0) io_submit(r3, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x2, 0x7, r2, &(0x7f0000000240)="dbfddde690bcf38a3b7ae9cd69878589d5077e21389e71e9379cea7bb27a1e152d5d2c5801e8dcae3e622386a7e9f14ae557bec10d431088d244b1f6f924847b9732a27a0c2aa83279056a947323f41294a9150ead65ad6339585a06fdf228a288baf366833b4c1f278fe13b2fae458472a7254eaec6eecb95f4bc8e23e4ea3b37b7b5299f0a0ac555c80a5920244103343f57237f671428fef033b233cd21e62fd8650211051fe285f3c012fcdf864dd0b633654a74889b34d427f3896a481c97a49e815c7d1d82d9deb3748284f59e90aeca860c405b6b1ecbc9c23bb688119a6d0efcb269b321a0c80403259df4a725", 0xf1, 0x6, 0x0, 0x2, r2}]) lstat(&(0x7f0000001ec0)='./file0\x00', 0x0) geteuid() epoll_pwait(r2, &(0x7f0000000180)=[{}], 0x1, 0x6, &(0x7f0000000200)={0x1}, 0x8) getresgid(&(0x7f0000006340), 0x0, &(0x7f00000063c0)) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x377140be6b5ef4c7}]) fsetxattr$security_selinux(r0, &(0x7f0000000000)='security.selinux\x00', &(0x7f0000000140)='system_u:object_r:iptables_exec_t:s0\x00', 0x25, 0x2) 00:16:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000040)={0x71e, 0xa03}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:16:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/199, 0xc7) 00:16:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x100, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) getgroups(0x3, &(0x7f0000000280)=[0xffffffffffffffff, 0x0, 0x0]) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='fuse\x00', 0x2, &(0x7f0000000580)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xe000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0x3}}, {@max_read={'max_read', 0x3d, 0x2}}, {@max_read={'max_read', 0x3d, 0xcc9}}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_appraise='dont_appraise'}, {@appraise_type='appraise_type=imasig'}]}}) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r3, &(0x7f0000003000), 0x7c) read$FUSE(r3, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r3, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r3, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(0x0, &(0x7f0000000100)=""/199, 0xc7) 00:16:10 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x20000) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) 00:16:10 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[], [{@fowner_lt={'fowner<', r1}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@measure='measure'}, {@euid_lt={'euid<', r1}}]}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:10 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYRES64=r0], 0x8}}, 0x0) unlinkat(r0, &(0x7f0000000100)='./file0\x00', 0x0) ftruncate(r0, 0x49) r1 = open(&(0x7f0000000040)='./file0\x00', 0x121000, 0x90) ioctl$PPPIOCNEWUNIT(r1, 0xc004743e, &(0x7f00000000c0)=0x2) socket$nl_netfilter(0x10, 0x3, 0xc) connect$unix(r1, &(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e) getresgid(&(0x7f0000000240), &(0x7f0000000280), &(0x7f00000002c0)=0x0) getgroups(0x8, &(0x7f0000000300)=[0xffffffffffffffff, 0x0, 0xee01, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0]) setregid(r2, r3) socket$key(0xf, 0x3, 0x2) removexattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@known='user.syz\x00') 00:16:10 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000040)={0x71e, 0xa03}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:10 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x6db6e559) ioctl$BLKROSET(r0, 0x125d, &(0x7f0000000040)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10012, r0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='ip6gretap0\x00', 0x10) [ 955.427303] audit: type=1400 audit(1560471370.790:5680): avc: denied { create } for pid=20724 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:16:11 executing program 5: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x4080, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x8) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) ioctl$TIOCSRS485(r1, 0x542f, &(0x7f0000000040)={0x71e, 0xa03}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 955.762257] audit: type=1400 audit(1560471371.120:5681): avc: denied { create } for pid=20724 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:16:11 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readlinkat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)=""/133, 0x85) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000001b00ffff00000000000000000000000005000900000000000a00000000000000000000000006000000000000000000000000ac660349f6826980b400000000000002000100000000000000020b0000000005000500000000000a000009000000008e97ff020000000000000000000000000001000000e66a8d748dc74a9c85f9b83c3c81a5eb000000"], 0x98}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200, 0x0) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) 00:16:11 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x149d02, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000100)) 00:16:11 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:12 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="02033e2cb1813a6410e1000313000000ffff00deffffff0005000600000000000aff00000000000000010000000000000000ffff00000000000000000000000005000900000000000000000000001600000000000000000000000000000000000002000100000000000000020b00f40000050005d3024be349c700000000000a00000000000000ff060000000000006f000000000645a956a56b10d2e26d0b0001d33192fcb023193e1267190000000000000000"], 0x98}}, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000080)={@initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$UI_GET_VERSION(r2, 0x8004552d, &(0x7f0000000040)) 00:16:12 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4f0481, 0x0) write$P9_RVERSION(r0, &(0x7f0000000080)={0x15, 0x65, 0xffff, 0x6, 0x8, '9P2000.L'}, 0x15) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KDSKBMETA(0xffffffffffffffff, 0x4b63, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000200)='./bus\x00', 0x14103f, 0x4) setxattr$security_smack_entry(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='security.SMACK64EXEC\x00', &(0x7f0000000140)='\x00', 0x1, 0x1) syncfs(r2) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) rt_sigprocmask(0x0, &(0x7f0000da1000)={0x4200000000000000}, 0x0, 0x1) 00:16:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:12 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0xcc) 00:16:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x42, 0xc427c5e60727af19) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@random={'trusted.', '\x00'}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000240)={0x238, r2, 0x0, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_SOCK={0x30, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2f0}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xa6b6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0xdc, 0x4, [@TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5d7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1eff9c3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x588}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x313}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe9}]}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf09}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xa9f2}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4ebc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}]}, @TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe817}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}]}]}, 0x238}, 0x1, 0x0, 0x0, 0x4004040}, 0x40000) 00:16:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:13 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$PPPIOCSPASS(r0, 0x40107447, &(0x7f00000003c0)={0x3, &(0x7f0000000380)=[{0x6, 0x3, 0x2, 0x15d21ff1}, {0xffffffffffffff6f, 0x100, 0x1, 0x8}, {0x2, 0x5, 0x4, 0x9}]}) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x80, 0x11) r2 = socket$inet(0x10, 0x3, 0xc) sendmsg(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)="24000000010407031dfffd946fa2830009200a0009000100041d85680c1baba20400ff7e", 0x8}], 0x1}, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$EBT_SO_GET_INFO(r2, 0x0, 0x80, &(0x7f0000000100)={'broute\x00'}, &(0x7f0000000180)=0x78) ioctl(r3, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000400)={'team0\x00', 0x0}) lstat(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r4, &(0x7f0000000700)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)=@getpolicy={0x188, 0x15, 0x120, 0x70bd2d, 0x25dfdbfb, {{@in=@rand_addr=0x7fff, @in6=@empty, 0x4e22, 0x4, 0x4e24, 0x7f, 0xa, 0x80, 0xa0, 0x0, r5, r6}, 0x6e6bbf}, [@address_filter={0x28, 0x1a, {@in6=@mcast1, @in6=@dev={0xfe, 0x80, [], 0x2b}, 0x2, 0x3, 0x33f}}, @tmpl={0x44, 0x5, [{{@in6=@local, 0x4d4, 0x2b}, 0x2, @in=@local, 0x0, 0x1, 0x3, 0x1000, 0xe5c, 0x4, 0xfffffffffffffffe}]}, @algo_aead={0xb8, 0x12, {{'morus640-generic\x00'}, 0x358, 0x40, "286400ffbd7c652c50244307cf0f61caa0303dee80e4e382ab81365d8f8243164e76b8df820ada1157dc6b4e9d84643177687fc47d62e216639241ad47ed0417981ce40e3a9c5b1901cf842c90c7a1fe07c0ea0533f1893fa891b9a32630bc02ae97bf5f5cc96f721f3f1a"}}, @coaddr={0x14, 0xe, @in6=@rand_addr="011c32673b379c7758814735b756f8a2"}]}, 0x188}, 0x1, 0x0, 0x0, 0x1}, 0x10) 00:16:13 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643d38a2709f8093e7941683056df7b30e69e6725faeaf60c33252632ba168cdb38fbac8e371d1e0fe308580d6337b", @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f0000003000), 0x7c) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r1, 0x80284504, &(0x7f0000000340)=""/176) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) 00:16:13 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 958.314970] audit: type=1400 audit(1560471373.660:5682): avc: denied { create } for pid=20795 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:16:13 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:13 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 958.490768] audit: type=1400 audit(1560471373.850:5683): avc: denied { create } for pid=20797 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 958.679483] audit: type=1400 audit(1560471374.040:5684): avc: denied { write } for pid=20797 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:14 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 959.070541] audit: type=1400 audit(1560471374.430:5685): avc: denied { create } for pid=20795 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 00:16:14 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x800, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x7, 0x4, 0x498, 0x0, 0x270, 0x270, 0x3b0, 0x3b0, 0x3b0, 0x4, &(0x7f0000000180), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @multicast2, @broadcast, 0xf, 0x1}}}, {{@arp={@empty, @remote, 0xffffff00, 0x0, @empty, {[0xff, 0xff, 0xff]}, @empty, {[0xff, 0xff, 0xff, 0xff]}, 0x4, 0x1, 0x18, 0x0, 0x64b1, 0x7f, 'veth0_to_bond\x00', 'team0\x00', {0xff}, {}, 0x0, 0x188}, 0xf0, 0x130}, @unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "807fdb2bb6c5a406f096dfcd25ebe36d06f2cffbd9862f9170b330071fe4"}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @broadcast, @broadcast, 0x4, 0xffffffff}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4e8) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r2) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:14 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 959.252046] audit: type=1400 audit(1560471374.610:5686): avc: denied { read } for pid=20797 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:14 executing program 1: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/checkreqprot\x00', 0x180, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000001c0)={{{@in, @in=@multicast2}}, {{@in=@empty}, 0x0, @in6=@initdev}}, &(0x7f00000002c0)=0xe8) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 959.293330] audit: type=1400 audit(1560471374.650:5687): avc: denied { create } for pid=20797 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:14 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 959.301902] audit: type=1400 audit(1560471374.660:5688): avc: denied { write } for pid=20797 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x801000008912, &(0x7f00000006c0)="1109000031e30000000000e07004486a57b22c00fa36297e1dfb4fc93875d9c0f148e57f326efcb09c0096568b673e132e7bb09bd760604c1087cd09a4a14302befe68ff6e702234f11288e285f69bab") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) sched_getattr(r1, &(0x7f0000000200), 0x30, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fstatfs(r0, &(0x7f0000000180)=""/46) timer_create(0x7, &(0x7f0000000040)={0x0, 0x29, 0x4}, &(0x7f00000000c0)=0x0) timer_settime(r2, 0x0, &(0x7f0000000100)={{}, {0x0, 0x989680}}, &(0x7f0000000140)) 00:16:15 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:15 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) write$FUSE_NOTIFY_INVAL_INODE(r0, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x6, 0x7, 0x8}}, 0x28) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_DIRENT(r0, &(0x7f0000000180)={0x38, 0x0, 0x7, [{0x6, 0x3, 0xa, 0x1, '/dev/fuse\x00'}]}, 0x38) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:15 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:15 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") creat(&(0x7f0000000100)='./file1/file0\x00', 0x0) mkdir(&(0x7f0000000140)='./file1\x00', 0x0) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000040)='./file1/file0\x00') rmdir(&(0x7f0000000000)='./file1\x00') unlink(&(0x7f0000000080)='./file1/file0\x00') 00:16:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_int(r0, 0x1, 0x1, &(0x7f0000000000)=0x80000001, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) sendmsg$nl_route_sched(r5, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)=@gettclass={0x24, 0x2a, 0x507, 0x70bd2d, 0x25dfdbfd, {0x0, r1, {0x7}, {0xb}, {0xffff, 0x8}}, [""]}, 0x24}}, 0x4000080) fchown(r0, r2, r3) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000400)=""/4096) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x800001000008913, &(0x7f0000000100)="e69a87d52d91ea581949d1fff43d12504f41840cae61ee9622abc747e63d369ec094761136ca6f9980f65d135e") prctl$PR_GET_SECUREBITS(0x1b) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:15 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:16 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x400000000001, 0x0) syz_open_dev$evdev(0x0, 0x0, 0x20000) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0xfffffffffffffffe, 'e \x00\b\x00', 0x4}, 0x18) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x480401, 0x0) r2 = socket(0x0, 0x0, 0x0) r3 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, 0x0, 0x0) connect$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast1, 0x40}, 0x1c) ioctl$TUNGETIFF(r1, 0x800454d2, &(0x7f0000000240)) fcntl$F_SET_FILE_RW_HINT(r2, 0x40e, &(0x7f0000000040)=0x5) ioctl(r2, 0x8916, &(0x7f0000000000)) close(r0) socket(0x0, 0x800, 0x4) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0), 0x0, 0x4000810, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) geteuid() getpgrp(0xffffffffffffffff) getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001d80), 0x0) gettid() fstat(r3, &(0x7f0000001ec0)) r4 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r4, 0x88001) sendfile(r0, r4, 0x0, 0x800000000024) 00:16:16 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xfffffffffffffeb6) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = add_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000140)={r1, 0xdd, 0x53}, &(0x7f0000000180)={'enc=', 'oaep', ' hash=', {'sha224\x00'}}, &(0x7f0000000200)="db46f3fcc304d96cbf662c7cd312dd21a9788e3d1b0524c29ccd9f83261a69aae9b2401d9b820fc89ac12bc5623a3744f172497f12d57c0ef084996014bb482a823c8f898f04d919ea7cbd1aebc4a6e1d59d7353f24d50fc665a5fe2002557cca6063700d3ffd26273eaf3a6dfa0b480a54cb6f6b8ffa9b348bc0ec0a33306e461e73d1fb4d788c416fae682863c99a45dbd15649c5a82bc2943ed9cdb1e82e7b6d5a8db8a2b587413c7c5c7dd3e484a92e5a0e238693f7cbebdc8f005e0014930856add3d9190d77bac7fabc4d0709287464b7ddc627c7bd991ea8870", &(0x7f0000000300)=""/83) keyctl$assume_authority(0x10, r1) 00:16:16 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:16 executing program 3: mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:17 executing program 4: 00:16:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@random={'system.', 'trusted.overlay.redirect\x00'}, &(0x7f0000000140)='trusted.overlay.redirect\x00', 0x19, 0x3) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0xfffffd1f) r1 = openat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x408080, 0x20) ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f00000001c0)) 00:16:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f00000001c0)={0xee07, 0x4, 0x2, 0x1, 0x1, [{0x72, 0x7, 0x5, 0x0, 0x0, 0x3009}]}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[]}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x100, 0x0) lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r1, &(0x7f0000000040)='./file0\x00', r2, r3, 0x1100) 00:16:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:17 executing program 0: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:17 executing program 4: 00:16:18 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x18}, 0x10) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:18 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:16:18 executing program 4: 00:16:18 executing program 1: socket$key(0xf, 0x3, 0x2) 00:16:18 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x84) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:19 executing program 4: 00:16:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:16:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:19 executing program 1: r0 = eventfd(0x0) fchdir(r0) r1 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000001240)=0x8ff5, 0x4) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x8) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000001280)=0x7) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000000)='bridge_slave_1\x00') getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000001140), 0x10) ioctl$EVIOCGNAME(r1, 0x80404506, &(0x7f0000000140)=""/4096) r2 = socket$key(0xf, 0x3, 0x2) stat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0083000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000040000000000000010000000000000000"], 0x98}}, 0x0) 00:16:19 executing program 4: 00:16:19 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000240)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000280)={r1, 0x0, 0xdce, 0x0, 0x8}) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) r3 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000180)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$FS_IOC_MEASURE_VERITY(r3, 0xc0046686, &(0x7f0000004040)={0x3, 0x1000, "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"}) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x2f, 'memory'}, {0x2d, 'pids'}, {0x2d, 'io'}, {0x2b, 'rdma'}, {0x2b, 'cpu'}, {0x2b, 'pids'}]}, 0x23) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:16:20 executing program 4: 00:16:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) clone(0x102, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) r0 = getpid() ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x4206, r0) tkill(r0, 0x9) 00:16:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) request_key(&(0x7f0000001180)='cifs.idmap\x00', &(0x7f00000011c0)={'syz', 0x1}, &(0x7f0000001200)='/dev/input/mice\x00', 0xfffffffffffffff9) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) getsockopt$bt_hci(r0, 0x0, 0x1, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000001040), 0x10) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000001080)=0x0) ptrace$peekuser(0x3, r1, 0x10000) pipe(&(0x7f0000001100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_WIE_ON(r2, 0x700f) getsockopt$bt_hci(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000001240)=""/4096, &(0x7f00000010c0)=0x1000) 00:16:20 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCCONS(r0, 0x541d) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000002c0)={'filter\x00'}, &(0x7f0000000200)=0x54) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000100)='NET_DM\x00') sendmsg$NET_DM_CMD_STOP(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r2, 0x400, 0x70bd25, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x40011) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) 00:16:20 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000480)={{{@in6=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000240)=0xe8) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000280)={@rand_addr="e86f0561a0e631852ed47611b6dec9f7", r2}, 0x14) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000040)={@local, 0x4, r2}) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:21 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000001a40)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=ANY=[@ANYBLOB="020300030c0000000000002000000000020009004000001000412d1fbc000000030006000000f9180200ee00e0000054d81458186fe8b9000200010000ff7fffffffffffff044a7b030005000000000002000000e0003f010000000000fca0d9"], 0x60}}, 0x0) 00:16:21 executing program 1: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='erspan0\x00', 0x10) r1 = socket$key(0xf, 0x3, 0x2) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f0000000140)={'filter\x00'}, &(0x7f0000000180)=0x24) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030003130000000000030000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002100100000000000000020b0000000005000500000000000a00000000000000ff02000000000000000000000000000100"/152], 0x98}}, 0x0) setrlimit(0x7, &(0x7f00000001c0)={0x200}) 00:16:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) [ 965.872453] audit: type=1400 audit(1560471381.230:5689): avc: denied { create } for pid=20974 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 966.020746] audit: type=1400 audit(1560471381.380:5690): avc: denied { write } for pid=20974 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:21 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:21 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB]) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x54482, 0x0) write$P9_RSTATFS(r1, &(0x7f0000000480)={0x43, 0x9, 0x1, {0x279, 0x2, 0xff, 0x6, 0x0, 0x100, 0x1, 0x100000000, 0x4}}, 0x43) write$FUSE_INIT(r0, &(0x7f0000000100)={0x80, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x20000, 0xfffffffffffffffe}}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r2 = geteuid() fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='system.posix_acl_access\x00', &(0x7f0000000680)={{}, {0x1, 0x4}, [{0x2, 0x5, r2}, {0x2, 0x1, r3}], {0x4, 0x1}, [{0x8, 0x3, r4}], {}, {0x20, 0x1}}, 0x3c, 0x2) write$FUSE_ENTRY(r0, &(0x7f0000000240)={0x90, 0x0, 0x1, {0x5, 0x1, 0x61, 0x4, 0x2, 0x8, {0x3, 0x8, 0x99, 0x8, 0x9, 0x7, 0x4, 0x8, 0xfdf, 0x9, 0x1, r2, r4, 0x4, 0x2}}}, 0x90) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000005c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8808000}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000d2abd7000fddbdf250d000000640004000c00010073797a31000000000c00010073797a31000000000c00010073797a30000000003c000700080001001600000008000400ff000000050004000400000008000400ff0000000800040000000000080004000800000008000300faffffff"], 0x78}, 0x1, 0x0, 0x0, 0x4044000}, 0x8000) [ 966.561216] audit: type=1400 audit(1560471381.920:5691): avc: denied { read } for pid=20974 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) [ 966.609053] audit: type=1400 audit(1560471381.970:5692): avc: denied { create } for pid=20974 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000001080)='map_files\x00') getdents64(r0, &(0x7f0000000080)=""/4096, 0x20000cb1) 00:16:22 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000005c0)=0x0) r3 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x6, 0x5bf7ca1c, 0x81, 0x39d, 0x0, 0x401, 0x80000, 0x3, 0x0, 0x7, 0xfffffffffffffff7, 0x2, 0x100000000, 0x7fff, 0x79, 0x3ff, 0x3, 0x4e, 0x200, 0x80000001, 0x8, 0x53c, 0x0, 0x5, 0x6, 0x7, 0x0, 0x100000001, 0x6, 0x4f7, 0x6, 0x1, 0x9, 0x7ef8, 0x80000001, 0x3f, 0x0, 0x1000000, 0x7, @perf_bp={&(0x7f00000001c0), 0x2}, 0x12048, 0xca, 0xb4, 0x0, 0x11, 0x7, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x100, 0xfffffffffffffff7, 0x0, 0xdef6, 0x0, 0x3, 0x40, 0x0, 0x3, 0xdd8, 0x81, 0x2, 0x9, 0xc3e0000000000000, 0x1, 0x9, 0x1ff, 0x5, 0x100000000, 0xe4, 0x0, 0x37a, 0x401, 0x0, 0x401, 0x59, 0xfffffffffffffff8, 0x3, 0x70, 0x2, 0x80000001, 0x4, 0x9, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x10001, 0x10001, 0x0, 0x6, 0xfff, 0x6}, r2, 0x42dfa5d, r3, 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f00000002c0)={&(0x7f0000000280)}, 0x0, &(0x7f0000000300)}, &(0x7f00000003c0)=0x18) [ 966.611333] audit: type=1400 audit(1560471381.970:5693): avc: denied { write } for pid=20974 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:22 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x44000, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in=@multicast1, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@empty}}, &(0x7f00000001c0)=0xe8) mount$bpf(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='bpf\x00', 0x2000, &(0x7f0000000440)={[{@mode={'mode', 0x3d, 0x8001}}, {@mode={'mode', 0x3d, 0x3f}}], [{@subj_user={'subj_user', 0x3d, 'eth0ppp1\\\'eth1system%'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '/proc/self/net/pfkey\x00'}}, {@euid_eq={'euid', 0x3d, r2}}, {@obj_user={'obj_user', 0x3d, '/selinux/commit_pending_bools\x00'}}]}) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x1000000, 0x0) mkdirat(r3, &(0x7f0000000300)='./file0\x00', 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x20, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0x1c) getsockname$unix(r3, &(0x7f0000000500)=@abs, &(0x7f00000002c0)=0x6e) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) 00:16:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) r1 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) ftruncate(r1, 0x2007fff) sendfile(r0, r1, 0x0, 0x8482) ioctl$sock_FIOSETOWN(0xffffffffffffffff, 0x8901, 0x0) ioctl$INOTIFY_IOC_SETNEXTWD(0xffffffffffffffff, 0x40044900, 0x0) [ 967.519528] audit: type=1400 audit(1560471382.880:5694): avc: denied { create } for pid=21006 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 967.676770] audit: type=1400 audit(1560471383.040:5695): avc: denied { write } for pid=21006 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.opaque\x00', &(0x7f0000000300)='y\x00', 0x2, 0x3) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getresuid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)) setsockopt$IP_VS_SO_SET_TIMEOUT(r0, 0x0, 0x48a, &(0x7f0000000340)={0x6, 0x1ff, 0x4}, 0xc) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x2) 00:16:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) ioctl$FICLONERANGE(r1, 0x4020940d, &(0x7f0000000000)={r1, 0x0, 0x952, 0x2}) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000040), &(0x7f0000000080)=0x4) 00:16:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 968.082271] audit: type=1400 audit(1560471383.440:5696): avc: denied { create } for pid=21006 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:23 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_BMAP(r0, &(0x7f0000000040)={0x18, 0x0, 0x1, {0x9}}, 0x18) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) 00:16:23 executing program 4: epoll_create1(0x0) clock_gettime(0x0, &(0x7f00000000c0)) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) r1 = openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) accept$packet(r1, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) connect$inet(r0, &(0x7f0000002bc0)={0x2, 0x0, @broadcast}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RFSYNC(0xffffffffffffffff, &(0x7f0000000400)={0x7}, 0x7) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(0xffffffffffffffff, 0xc0145401, 0x0) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0)='SEG6\x00') setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0xffffffffffffffe3) sendmmsg(0xffffffffffffffff, &(0x7f00000089c0)=[{{&(0x7f0000000440)=@in={0x2, 0x4e24, @multicast2}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000500), 0xffd2}], 0x1}}], 0x469, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000280)={0x0, 0x0, 0xfffffffffffffffe}, 0x4) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000500)={0x0, {{0x2, 0x4e20, @rand_addr=0x200}}}, 0x88) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) 00:16:23 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev\x00') mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x40000000009) getsockname$packet(r0, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000140)=0x14) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:24 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000140)=0x68) 00:16:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) [ 969.163319] audit: type=1400 audit(1560471384.520:5697): avc: denied { create } for pid=21050 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:24 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000180)={0x73622a85, 0x10b}) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) arch_prctl$ARCH_MAP_VDSO_X32(0x2001, 0x8) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x600, 0x44) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000100)={0x101, 0x20}) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 969.413732] audit: type=1400 audit(1560471384.770:5698): avc: denied { write } for pid=21050 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='mountinfo\x00') dup(r0) r1 = socket$key(0xf, 0x3, 0x2) getsockname(r1, &(0x7f0000000000)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000140)=0x80) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:25 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f0000000180)={'bridge_slave_0\x00', 0x400}) r2 = socket(0x19, 0x5, 0x1) getpeername$netlink(r2, &(0x7f00000003c0), &(0x7f0000000500)=0xc) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x80) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000300)=@ccm_128={{0x304}, "89bdb7f582d46bb1", "8ea7a18711637133b7661eefa43379ad", "621d121b", "47485d24c7ac5e27"}, 0x28) fsetxattr$system_posix_acl(r0, &(0x7f00000000c0)='system.posix_acl_default\x00', &(0x7f0000000200)=ANY=[@ANYBLOB="020000006b796d5ecd4e6e6c01000300", @ANYRES32=r1, @ANYBLOB="02000300", @ANYRES32=r2, @ANYBLOB="040004000000000010000100000000002000050000000000"], 0x34, 0x1) 00:16:26 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000005c0)=0x0) r3 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x6, 0x5bf7ca1c, 0x81, 0x39d, 0x0, 0x401, 0x80000, 0x3, 0x0, 0x7, 0xfffffffffffffff7, 0x2, 0x100000000, 0x7fff, 0x79, 0x3ff, 0x3, 0x4e, 0x200, 0x80000001, 0x8, 0x53c, 0x0, 0x5, 0x6, 0x7, 0x0, 0x100000001, 0x6, 0x4f7, 0x6, 0x1, 0x9, 0x7ef8, 0x80000001, 0x3f, 0x0, 0x1000000, 0x7, @perf_bp={&(0x7f00000001c0), 0x2}, 0x12048, 0xca, 0xb4, 0x0, 0x11, 0x7, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x100, 0xfffffffffffffff7, 0x0, 0xdef6, 0x0, 0x3, 0x40, 0x0, 0x3, 0xdd8, 0x81, 0x2, 0x9, 0xc3e0000000000000, 0x1, 0x9, 0x1ff, 0x5, 0x100000000, 0xe4, 0x0, 0x37a, 0x401, 0x0, 0x401, 0x59, 0xfffffffffffffff8, 0x3, 0x70, 0x2, 0x80000001, 0x4, 0x9, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x10001, 0x10001, 0x0, 0x6, 0xfff, 0x6}, r2, 0x42dfa5d, r3, 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f00000002c0)={&(0x7f0000000280)}, 0x0, &(0x7f0000000300)}, &(0x7f00000003c0)=0x18) 00:16:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:26 executing program 1: recvmmsg(0xffffffffffffff9c, &(0x7f0000000680), 0x2, 0x22, &(0x7f0000000700)={0x0, 0x989680}) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000740), 0x4) r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x88000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}}}, {{@in=@multicast1}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:26 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303085b36360da2d176f51ab3030303000000000000000ea00000030302c757365725f69643d7af79f4da7a79cdba883f2ba010ab4efb6a25f976fe2db9410f11679393cc1bc63a3b2239a2727f4576d6eaa61", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x800) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x80, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000680)={{{@in6=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000240)=0xde) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000003c0)={@multicast2, @empty, r3}, 0xc) fdatasync(r1) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) 00:16:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000005c0)=0x0) r3 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x6, 0x5bf7ca1c, 0x81, 0x39d, 0x0, 0x401, 0x80000, 0x3, 0x0, 0x7, 0xfffffffffffffff7, 0x2, 0x100000000, 0x7fff, 0x79, 0x3ff, 0x3, 0x4e, 0x200, 0x80000001, 0x8, 0x53c, 0x0, 0x5, 0x6, 0x7, 0x0, 0x100000001, 0x6, 0x4f7, 0x6, 0x1, 0x9, 0x7ef8, 0x80000001, 0x3f, 0x0, 0x1000000, 0x7, @perf_bp={&(0x7f00000001c0), 0x2}, 0x12048, 0xca, 0xb4, 0x0, 0x11, 0x7, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x100, 0xfffffffffffffff7, 0x0, 0xdef6, 0x0, 0x3, 0x40, 0x0, 0x3, 0xdd8, 0x81, 0x2, 0x9, 0xc3e0000000000000, 0x1, 0x9, 0x1ff, 0x5, 0x100000000, 0xe4, 0x0, 0x37a, 0x401, 0x0, 0x401, 0x59, 0xfffffffffffffff8, 0x3, 0x70, 0x2, 0x80000001, 0x4, 0x9, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x10001, 0x10001, 0x0, 0x6, 0xfff, 0x6}, r2, 0x42dfa5d, r3, 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f00000002c0)={&(0x7f0000000280)}, 0x0, &(0x7f0000000300)}, &(0x7f00000003c0)=0x18) 00:16:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = getuid() syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000003400)=[{&(0x7f00000002c0)="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", 0x1000}, {&(0x7f0000000140)="03065d3715ac0c54028c3093bff56894b4ad141dd5a99387f1ec9aa5e179a6c1f1c2afea3f887e06ead323a5c17eee921e61b877bd31799079e8145d69b1e2d1681f91c2b53766805d194d4cde9f0cc68788cfd904fdf20e591ea9627d416778c4b74beb899d5bb34935351b04c128fcaab3e3853c34eabee2a5bd935a9878b281f7d0c971b6f56699690cf9d03bf3ec62c465df2231564de988abadc5706a3fde620ba5127b9505da52cc4cf68256b2e42f48fe1c5c38a0ec0e", 0xba, 0x386}, {&(0x7f00000012c0)="cee1f2892af29f182c673a3d6581b5070392af10cdaad32f127aa5d4425c8551b9b21fb121e341893ee36b41824d34ae5d1929a19aa211df3a1f158ca1b78d689930a3c853fb7d8de263b97cf265ac6e37dd3029137c96f77807219edb7dedd1fdd76c1638ad52c720c05a71c6cd5d4d", 0x70, 0x6}, {&(0x7f0000000200)="e43610138d7d16f74d3a", 0xa, 0xffffffffffffffff}, {&(0x7f0000001340)="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", 0x1000, 0x20000}, {&(0x7f0000002340)="354a052685aacd8051d8598ab6f73b07ae3b322f5196e58e4db96cdc7ba0346f4bcec31fe33ba7b610f30d8fffd4d6d0db8414f01afd6dbe57b4b92d9c41c166193f0658cd79402f9f100a835246604372d60a9ef576d0b2c80164c35fd2a2a58d2ade2835cc5d411a45c4b28a5a7a46f6d797b804cb1a33b88a428abf01aa561c4c25264575f6d3931dc959cd05e116f17c8e980964d352ba255eef5a1e86eefa54d7a6cf61c2771f51c00242ae055aa50cc4a4abb63cedfd", 0xb9}, {&(0x7f0000002400)="fa4b18c6a7675f4e7f3963d69b5e830c40a495ba6f250786ac46ee61ab65db45650c9e84f88400bd4c6faba256f407c027e14eb0ed784aa811e26b933590b739535ac0ffab17f9e09a9b94f1ab0d4a66c75e16ffd7856b7d66482b1a33865a1bd55614425a2a41681cd3186d1b2acb68791d8615a97a4c52fe1e64997a7ce82cbf532b865a3faf0f70bcfc7017b2382c3e7c98c20f26f632b1e54a6e8be2a143d5fc04ff4aa38dc72eb722b10f656eedb750d2081a12bb6d1a156d3c2cbf83c724a869b21b8549d0061ecff8634953b9f58e60ee65d0b34cb24f3435ede655a35099fcf631eb62a0869c11d99a1241d433a17f013a4303f0c01a7610b7ea6dd98598599fb3164961f1fc7e64ccf6c0cbdf7467ee18cdc8fd232d924e546163245b39715c15c2b5e26e2501798e4153bfd091ce826fadd599e00dbfd15c71209c46ed8937b1b39d7787972f153240e538d4d3de40b7d57b779cff514ac37a2f2457f329e98f3b1a7f801d7ce2ef97c6db9e282413b45629a3994703578bd40f2415314fc98f9d5f3e1c329d0ad614e68c446f174f3f1c782a9f013894c4f66c6e7743a21d6cdda6470b0b6f0065c7ea4f7f072b56952f32db809a939d5144d5b9bc7a70b643c2c8cb6127a56c11038f5f4c399883af8944a085bf4c6b3a25af6df8fce72d68a500535dbdd3867b4d29c77a5b38f26d029e2ba2ea5f71ac3db8cffe11cab4ce98841d3684cd006b323163b01d515e6acd4a02eb34873e65774cdd17059aac630ea15c1aec876053357754a1e9d17bc1e9147008cc145b97142f4d13a8379de43224f5eba00f017f61ccc6a80a9235ededa19aa3a77cc6169423e083ed9a85a81623fab1ffd6eda9478770c9ecad990e96c1c6c56f7e2748cadc2be73dac1d97b413751244e9594b9394370664e23d42da45702187c5d39a8d4d39e6046ec36639fc12c533f2e3a10e5d34cc8d4379a3d85a0c903625a387bfe2c0a5934a8580d7974eae9807aec81dac4fd7429019318f15c6e9c5c01fe8f92f4eb378bff3c35f99b45c8130631d7251eee991bef7545ed7b138a82b5e691d91ffc37f5a8296fbc9cce2c59c6fd71b2a6f1fd119e5c689059e33a3c1fabfeff9550c19cf6de4b39e5021ba2cea87b930416c78f3ff7c165a54ab4e217446a8d9c8ee9ee00366238a9b0c1aa6af6ed9e962ef92aa72e0e723e51061b1c7ecec3b525f02aa454b374e9297220c49bcd6600354eadbb25370144628434d2a4e0c6be2a93b49c35bc37830ebc7e80c699b89acbdb5bf1cca6d4df483d11545cb6c2fda248f9b93f0df51cd08509cf7147fc6220dc4442699e2b09812177eb65ed133b427f676d2b4bd57db2a0c19143a4d9b81e8caa6fedbaa7a3195b1ef9383d741c280270c1fb791ce31f987cf9633ce8673becac7ff0f3b8a38b69516f5598ae0c8328baf2ad4faa6e2bca8a89126536d1106efd6f0b2c8d64a667563edb3add5e7ea8f885da78f5466c6d810d3fd4f4e468fa49d7ff6285423106d25660f3726293d53a55ca47c6ab8117ed59dc26f70542426904d06044f2c856c8c53ed26a8e874b946780b6505596add621cfa1e50ec6fb061151295393ac71e6072c008b37808ee973ec1f4cc2e33b0a3a160c6600dcb7bb60bac703481fd0023802199e89c55f553a44fef62399593d395a79733d8e5b6c58981917af5758516b28c385f490fa84aed3dbddd6198e80527fde541fca1d58f846876841d4aa83461de177983be95e73eb2ef208d757f0b3b27170f482663644ffafc01efb8be5b692481086d782d8e2e380b4d506ba878b704b6bead55750452022f073619e24b3051081412a4517456c84a1785e36e242b0b60fcad297aa9b9edbc563e2b86f8f8cc2c9e01be4e9760df8fddb1a440d043d960260fbbfb4afaba7c2ea3603ddd3ebb546f34d47fa82748cfd131f121db646e1896c8ba8e9e0d01100438fd2bd7220bf4735c063f1d46c9b1e65af5f309e82bf14a1ff0fcee14551c49787d5524e94a3a8e4fabab7e1d2e370b409ba4b091590bfbd82fff68338b73d5739b465ac082e3ea92db90fc11c0cf24111782cfd389ed3bb334ea5b9d5d510305a5e612543369c7eb38ea99eb48e1a770e533b59efc68c437397eb2b2ab00e4a35f8bc5d6a856f233d8c1f6552e4bca0a4054b66fe8eaa31631bd532711e9a46068e95fd789376be6a3cb47b9105a0a314332f6867eec89fddd4b505001437bad37d302a8034d227dd4369a614abcee4fc6fa1d2cc753a05dcc864da79c69c79346bb362aceb929589b6a261ff4615eeb4b09cf039228657523aa705aef1f1937a7550f8f1143ff805842eb469d5677ca110dffd4715a3a0201a3be146e1dd4f6c81b5a181f521b887396589291bfd45af753f3e759bb8fb3753cf984217e6491ad27f79db801f470917678739990cc3f50fd6354ded2cf59433ca50fa7fa0aeb3078f490dc3c6544a2cb281c922a8037b54887721a94769366eef6465c7c62a47109b3d737e505192c8c2202a10e3a793633206d6edc2fd8ea9d4a77e7a9414090570743a74834b2be7caa90e4ee4a3d486d105cbcca340cbc3350b030957855da7894d49df76f4792c489034021d0f02d420e29bf129548e03985945e4caba60e216442add0c0188a5ab586b3eab9333cbf733ae18c667ecea0bd294efc9878cd9739200ca73b0ac7980138a507a4fca6cc801bef0ef029fb02fcd803f495a3510a06cc01105bf85199049ea44cce7936985e33794561d684be90130fbf623498d492ae3bc8ef63321e634254f2af56b3888b65b54ec9aefe30837a849dc9ca6b28206f48522fd59861826fc08d55ffdf39602081275c554190df7e38dba2fe8cda32d2ada9e3223fe40b257d67bdfe48219b0ce333bd341994bfad757781d5c091f3a350586e0a68e6ae0b470bbb58c25f2a9030e3fc689c1a1908e2e8f4f0235ac144c584b56cf7551e9991d7055e889016903d612ea8c54577350424c42f7cf219b780b2466d0ad78eb4e02857ecfbc4914c2c50e6f2d6de81c66f574a211c9b96fc714c720a4a165ace84592edcaac31db70d95a4185517e8027b20b4dbcfa8748468118cc55f95634694f1435b9e6f36cd1fa16d277f9f40a0086cdf15346cc32deda29efd41abdd85746dabae3d68d824d6a13e120ea27953616e2a57abc3179da9b4ce21f1e97721d1fb68dbd76afd92c9835531795775f18c95831d1a3a5280729cafd0ec9a23713d0c36995180c28c8d3c5c595e39692da3e2f96a2540be530ed7a34faa9207583e42b6d1d223e6d1751fb2b2470ef6550551f7ebd1b7f006cd96279e34c536ab32631faa38abcddcd83c181b5bed9b7a16f47c76673c674e75427b5b34e84719433e9efb629d608893af8a300a544f755d2168e743030838956003a56e806e66b5ba95928f2df753c6a6582e3d9bc68a64fcae08543e98bbaf7ddd37dddf1b29244c11e11eded13496fd596cfee52ac1934098527d02b1e49de0b9f7823425f38ac2a01bd4a7a7a4b953216c9dffd42c810ce579457789e4cc11ab06aa10db1e5a066bd0232cde06ac9adeca23eec27a15669fbae5de36fea2257ca6ca7df51a3d5b0fbab5796dcbc5d473348e7cad3230a041cf6ee32efe557da08f77c27bbd205338adf3b1a674a1d886a17f2e0c8bf6080c22faf3932f24a5f54b13c97db6e25a50d62532d7712d2aeb692f14436e87d561ac846b7e7b85bc5e5800671219e2d3f2c59802494b81337694eff495bd90c4135e8c5640b0e102b9f217b9609681197a2b476e93381b91c9a0bf8889514ea9aab8ed5071bdd87c134f845b345862695a37986bcfd61dde26a37c54141f4ee97b8dd4379651e6dd6b64448c990aeaea2d93170e4fdd3584d28fd504fa954bd4e4bcb66ba418f02c5d6b82f8cd5885afe8903d632e967a7029001d9313573e0fe13a7998b04618385f3d5f8734576c59c23d291cab569f0f4cfb450b1dfe871c70442778a65a6d63d1b4df6c0122a0dc4f7f374608049f9390af32f115dd2c4aaae3700b4e4f2970f9788bf74fdd875fe3e48df7855cb279d66ea289bb094c65776b1177b2490eddfbd8035285817bbd6eb22c47f70cb7e215bd916a94b5fbdc3e18055655572325822127f74dd4ff4796e6827228b6d094b401010d0e65e879044be2387461ce4330fd65f534bbb46e53e364bb2c4afaf1986e3d1fd64a4cdee0c17400b9451898395b8cc46d585dece4de2b34c02a01700d76b89302f72c53d270961f47e43e382a4010446ab04fe16673eaaebf6abf485b9a064982325534b83dcfd51fde1457a707e038bd37a34ff0ff194acc474472a55e228a48c89804ab403fda0149365807cf2f6bffa7c0273844ecce1c60ae8ed06fb3b399832f865595f6c02ad4164a993bbf0d0f70e3971bce0f4e12fae9073a1d664e7165442619c9c2c3f527812e1fa1eb98a3f8655b202de47e43781e81118a54b185b622bc8ddc965a454c8957718d7f0c28b408338931c9abcaf72fa9c7024f338344dc0b6990d915a14c5bc5dfc8cb7ec4f0c039502a7db9a9a28bbaad5f11a864bb91151bd84fe236b206584998d54f39b91e3ea478c4bd4b3b788f2d294f2181fe1c704b71346be5a22dbb63252f192a8410a67e1ade2a57637507d8e9c99996b959fa9954c45c6c97e7d298dff63ba1e59cb06c50a99eac3cbc3afb235cf5570b211fddc537b09cb324b0d6e9eabc9533b2c598c24f8fb836ce08e8ddd32a004a7ca4e3efb090e70d8c0cfa5267810c1f32181793f82557a444404bb7ced3644e7fc4d19467c0952a3349459aa59ba6debe076442e56e199437ce2965ac09962a15d59f47a68bd9b0dcf035f1f655d32692713cc4239e5fe4e01906a37e95ea54ffb317f93c18fbf368292252f99f110aa3bff0f6885e7254c5323481518688105638a461a22f03b87f8692b0b2972ae079ffc8471f47eeed941c15da036a0534955c57aacf19156e60fab054209df68045b357cde45d22b536e2bc64333d7f12fd15f26052538c26a6a5053edffd554a28addefe0ff1a666887f41d5ffcd85edc47c71e05163e4c4d4f69587e7ca4db5f805fd08f9f8da9d2332268f7cedb3c18685352fe19673f66ff849f9223dda502be317ce9d6ffaa655e8a7019beab36253eb55e66917046bfcec472bf08c0b089d70c4ebdf3307da9cd8a76724ed633ee26947a41ce6b74fed3e9d59d1abb157514e1a8b15c3eb873fac60e9a590d902ace80633854d73752f7a54c6b18d06cdeb1a8127484e13e5fba34789a16b045631bc88b2ba7d86f482e5d31f1af47fed6c776589dfe5a821399110e661384d4c9d06dc5ea26593774506a995e72b1f0d681e8d20559a11441827fd0087a3e1d28caf4430e385a97d7b15aa87e3f82e3f4b4d3f701afcf517e0530517e743b8e66043862de045a3adbed21817253886a42c68f5369d9d9e5c54011fe5a969c86a2543763274de9a0759875755a8a671c468059f145939f9e9fe48e11293b8f7344bc537dc2a0907e179eec79d3c3dcf4f12bf3cff851553c0a6f810a32047972c277b35fc9b7be62c8a72c19224ba2116047a2c9633d41d8658d61c7083d2f62dfb353dca1bfdd078933affc76ab1af0b1bc37bff58dcf1b8b67a31239916dc8692bdaee9e7de79462e403dec244749c25d95ff6e21d412bdc3ac4b8028b11f94c30bbe0c14b89584116f82073c345ee0bed9cafffd024974914ba9272ad17f1ec17f18ca39518d796e3b7af6", 0x1000, 0x80000000}], 0x0, &(0x7f0000003580)=ANY=[@ANYBLOB="646f74732c686173682c7375626a5f757365723d747275737465642e6f7665726c61792e7265646972656374002c636f6e746578743d756e636f6e66696e65645f752c6d61736b3d5e4d41595f57524954452c657569643ca674ce3238c9d4ac1b812a6d1b008312c54fb30cff57055540", @ANYRESDEC=r1, @ANYBLOB=',\x00']) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000340)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) socket(0x5, 0xe, 0x1) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="257285bcc3d8571aa7bfe6dcf6299dd5525f8b39f048f3317d97addc46115faff8848fd1412f06a2737379a2e2fdb9c460b2f60c9917515f73f0bd8599b68905db4cbdd51f754961feaa3c2066a5f5ea3b072c7bf3"]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000005c0)=0x0) r3 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x6, 0x5bf7ca1c, 0x81, 0x39d, 0x0, 0x401, 0x80000, 0x3, 0x0, 0x7, 0xfffffffffffffff7, 0x2, 0x100000000, 0x7fff, 0x79, 0x3ff, 0x3, 0x4e, 0x200, 0x80000001, 0x8, 0x53c, 0x0, 0x5, 0x6, 0x7, 0x0, 0x100000001, 0x6, 0x4f7, 0x6, 0x1, 0x9, 0x7ef8, 0x80000001, 0x3f, 0x0, 0x1000000, 0x7, @perf_bp={&(0x7f00000001c0), 0x2}, 0x12048, 0xca, 0xb4, 0x0, 0x11, 0x7, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x100, 0xfffffffffffffff7, 0x0, 0xdef6, 0x0, 0x3, 0x40, 0x0, 0x3, 0xdd8, 0x81, 0x2, 0x9, 0xc3e0000000000000, 0x1, 0x9, 0x1ff, 0x5, 0x100000000, 0xe4, 0x0, 0x37a, 0x401, 0x0, 0x401, 0x59, 0xfffffffffffffff8, 0x3, 0x70, 0x2, 0x80000001, 0x4, 0x9, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x10001, 0x10001, 0x0, 0x6, 0xfff, 0x6}, r2, 0x42dfa5d, r3, 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) get_robust_list(r2, &(0x7f0000000380)=&(0x7f0000000340)={&(0x7f00000002c0)={&(0x7f0000000280)}, 0x0, &(0x7f0000000300)}, &(0x7f00000003c0)=0x18) 00:16:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='ne\xc8\xe8?\xda\xf9\xd9\xd6U\x00\x00\xed\xb1>\x17\x00Q\x02\x8b\xbb\x1c=s\xba\x91:\xbf\xdc<9\x7fW\x0fE6m\xa9\xf26\xe93l\xbcs\a\xa9\x86\xd0o\r\xc1\xab\x18\x0e\xa2\xf95\x81\x8e\xdf\xee\xc5.\xa7\x84|=}\x1d\x01\xe4%T\xc6\xf3\f^\xd3\a\xcf+\fL\xae\xa9:E\x18\xf3=\xbe\x03\xc5\xa0\xc2\xa0\xf8\xf89w\xbd\xfeo\x1a\x1f\xf4%\xbfctD\xf8\auP\xab\x9c\x04n\xa3\xab\xb0QG\xd0Wr\xdcGp\x8d\x98\xd1\xf5\x10\xdc\xd2M') accept$packet(r0, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000280)={{{@in6=@remote, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@loopback}}, &(0x7f0000000380)=0xe8) ioctl$IOC_PR_CLEAR(r0, 0x401070cd, &(0x7f00000004c0)) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@local, @in=@remote, 0x4e22, 0x0, 0x4e21, 0x1000, 0x2, 0xa0, 0x20, 0xbb, r1, r2}, {0x757e, 0x8, 0x2, 0x8000, 0x8, 0x400, 0x1, 0xa88}, {0x0, 0x10000, 0x4, 0x9}, 0x20, 0x6e6bb5, 0x3, 0x0, 0x1}, {{@in6=@remote, 0x4d3, 0xff}, 0x2, @in6=@ipv4={[], [], @broadcast}, 0x3502, 0x0, 0x0, 0xffffffff00, 0x0, 0x4d, 0x1}}, 0xe8) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000140)='veth0_to_bridge\x00') r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou0_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x100) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000340)={'ipvs\x00'}, &(0x7f00000003c0)=0x1e) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r2 = dup2(r0, r0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x24, r3, 0x401, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x0) 00:16:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000005c0)=0x0) r3 = perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x6, 0x5bf7ca1c, 0x81, 0x39d, 0x0, 0x401, 0x80000, 0x3, 0x0, 0x7, 0xfffffffffffffff7, 0x2, 0x100000000, 0x7fff, 0x79, 0x3ff, 0x3, 0x4e, 0x200, 0x80000001, 0x8, 0x53c, 0x0, 0x5, 0x6, 0x7, 0x0, 0x100000001, 0x6, 0x4f7, 0x6, 0x1, 0x9, 0x7ef8, 0x80000001, 0x3f, 0x0, 0x1000000, 0x7, @perf_bp={&(0x7f00000001c0), 0x2}, 0x12048, 0xca, 0xb4, 0x0, 0x11, 0x7, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x8) perf_event_open(&(0x7f0000000140)={0x5, 0x70, 0x100, 0xfffffffffffffff7, 0x0, 0xdef6, 0x0, 0x3, 0x40, 0x0, 0x3, 0xdd8, 0x81, 0x2, 0x9, 0xc3e0000000000000, 0x1, 0x9, 0x1ff, 0x5, 0x100000000, 0xe4, 0x0, 0x37a, 0x401, 0x0, 0x401, 0x59, 0xfffffffffffffff8, 0x3, 0x70, 0x2, 0x80000001, 0x4, 0x9, 0x5, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x10000, 0x10001, 0x10001, 0x0, 0x6, 0xfff, 0x6}, r2, 0x42dfa5d, r3, 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 973.520412] FAT-fs (loop5): Unrecognized mount option "hash" or missing value 00:16:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 973.671772] FAT-fs (loop5): Unrecognized mount option "hash" or missing value 00:16:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) umount2(&(0x7f0000000180)='./file0\x00', 0x0) ioctl(r0, 0x401, &(0x7f00000000c0)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x1) 00:16:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYRESHEX=r0], 0xffffffffffffffc3}}, 0x0) 00:16:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000005c0)) perf_event_open(&(0x7f0000000200)={0x7, 0x70, 0x6, 0x5bf7ca1c, 0x81, 0x39d, 0x0, 0x401, 0x80000, 0x3, 0x0, 0x7, 0xfffffffffffffff7, 0x2, 0x100000000, 0x7fff, 0x79, 0x3ff, 0x3, 0x4e, 0x200, 0x80000001, 0x8, 0x53c, 0x0, 0x5, 0x6, 0x7, 0x0, 0x100000001, 0x6, 0x4f7, 0x6, 0x1, 0x9, 0x7ef8, 0x80000001, 0x3f, 0x0, 0x1000000, 0x7, @perf_bp={&(0x7f00000001c0), 0x2}, 0x12048, 0xca, 0xb4, 0x0, 0x11, 0x7, 0x1}, 0xffffffffffffffff, 0x3, 0xffffffffffffff9c, 0x8) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 974.517915] audit_printk_skb: 9 callbacks suppressed 00:16:29 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x101000, 0x0) write$P9_RLOCK(r1, &(0x7f0000000040)={0x8, 0x35, 0x2, 0x3}, 0x8) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, &(0x7f0000000140)=r1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 974.517928] audit: type=1400 audit(1560471389.870:5702): avc: denied { create } for pid=21174 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:30 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000140)='/dev/input/mice\x00', 0x0, 0x220000) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = accept4(r0, &(0x7f00000000c0)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, &(0x7f0000000180)=0x80, 0x80800) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000001c0)) ioctl$sock_ifreq(r1, 0x1b273bd4c384e7b2, &(0x7f00000002c0)={'sit0\x00', @ifru_data=&(0x7f0000000200)="9715370ac9c40c4f4d717878eee5115bb5309f6a3842a761194c36881cb6c41c"}) setsockopt$inet_udp_int(r1, 0x11, 0x1, &(0x7f0000000300)=0x100, 0x4) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockname$unix(r2, &(0x7f0000000340), &(0x7f00000003c0)=0x6e) 00:16:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 974.806390] audit: type=1400 audit(1560471390.170:5703): avc: denied { write } for pid=21174 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000005c0)) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 975.248349] audit: type=1400 audit(1560471390.610:5704): avc: denied { create } for pid=21174 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:30 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="30303030303030ff003030302c69757365725f76c500"/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) syz_open_procfs(r1, &(0x7f0000000140)='net/ip6_mr_vif\x00') 00:16:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:30 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r1 = getpgrp(0x0) setxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=@random={'trusted.', '\'/vmnet1md5sum}em1cgroup{vboxnet0[%\x00'}, &(0x7f00000001c0)='/selinux/commit_pending_bools\x00', 0x1e, 0x2) write$cgroup_pid(r0, &(0x7f0000000040)=r1, 0x12) r2 = socket$key(0xf, 0x3, 0x2) r3 = getpid() ptrace(0x4207, r3) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0204000372030000000000000000000005000600000000000a0000000000000000000000000000000000000000050009000000ffed0a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000ab9dd3805f1efe74000008000000000ff0200070000000000000000000000010000000000000000"], 0x98}}, 0x1000000000000) tgkill(r3, r1, 0x40) 00:16:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) 00:16:31 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:31 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffec2) 00:16:31 executing program 1: r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000040)='pagemap\x00') getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)=0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) write$FUSE_ENTRY(r1, &(0x7f0000000280)={0x90, 0x0, 0x1, {0x1, 0x2, 0x4, 0x1, 0x4, 0x8fe7, {0x5, 0xc15, 0x2, 0x7, 0x8, 0x4, 0x100000000, 0xccbf, 0x2a0, 0x8, 0x0, r2, r3, 0x5, 0x1fffc0}}}, 0x90) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x3, 0x0) 00:16:31 executing program 2: syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) r2 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x3) ioctl$TIOCGDEV(r2, 0x80045432, &(0x7f0000000040)) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) prctl$PR_SET_DUMPABLE(0x4, 0x3) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/policy\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) 00:16:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:32 executing program 5: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'filter\x00'}, &(0x7f0000000180)=0x54) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:32 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:32 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) dup2(r0, r0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:32 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) setxattr$trusted_overlay_opaque(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x3) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) 00:16:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/pfkey\x00', 0x201, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:33 executing program 5: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fsetxattr$security_smack_entry(r0, &(0x7f00000000c0)='security.SMACK64\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', 0x19, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="11dcd723ac3b4e03272a2ee9e031d1ec4487cad460b463f6a6926ee847ef2ee541f81d1529d877d7826d26c23370") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 00:16:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x280002) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r1, 0x40485404, &(0x7f0000000180)={{0x3, 0x3, 0x7, 0x1, 0x1}, 0x2, 0xe6fd}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000400)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_security(0x11, r1, &(0x7f0000000140)=""/162, 0xa2) 00:16:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000040)=0x0) tkill(r1, 0x12) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) symlinkat(&(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file1\x00') llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=0000000000d=\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000480)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:35 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0xfffffffffffffea8, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xe5bfcfaa9325cd5f) 00:16:35 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$PPPIOCCONNECT(r1, 0x4004743a, &(0x7f0000000180)) r2 = fcntl$getown(r1, 0x9) waitid(0x3, r2, &(0x7f00000001c0), 0x2, &(0x7f0000000240)) ioctl$RTC_PIE_ON(r1, 0x7005) 00:16:35 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) 00:16:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB="5f86df6c1946a3752e59f9f3465e3bef9230083a00b96dd3613f24b6bdddea95823af08efe6c5e5c2b6effff6bf086232ad52a5014968424587330e247d9ff9a5a15ddd4ad7afd6075d173"]) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x10000, 0x40) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0x100, r2, 0x111, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x44, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="dc2e42c1bb109e7b84a49cb611d6bc12"}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x28}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x25}}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xc00000000000}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xfff}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e24}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x21}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}]}]}, 0x100}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) 00:16:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/3, 0x3}, {&(0x7f0000000100)=""/83, 0x53}, {&(0x7f0000000180)=""/13, 0xd}, {&(0x7f00000001c0)=""/14, 0xe}, {&(0x7f00000002c0)=""/241, 0xf1}, {&(0x7f0000000200)=""/28, 0x1c}, {&(0x7f00000003c0)=""/23, 0x17}], 0x7, &(0x7f0000000480)=""/4096, 0x1000}, 0x40000021) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001880)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f00000018c0)={0xf0a4, {{0x2, 0x4e20, @multicast1}}}, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001540)={{{@in=@empty, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@ipv4={[], [], @multicast2}}}, &(0x7f0000001640)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000001680)={{{@in6=@dev, @in6=@ipv4={[], [], @multicast2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @dev}}, 0x0, @in6=@empty}}, &(0x7f0000001780)=0xe8) fstat(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001500)='system.posix_acl_access\x00', &(0x7f0000001980)=ANY=[@ANYBLOB="02000000010006000000000002000200", @ANYRES32=r2, @ANYBLOB="291650d58c97c710f7b3712aef75f71c25bdad4a66722c2021c279519217fb488f2e8037930043bd6cf8c2b4dd91da4c0e5e3bc5dcea3279161e1ad4ba36e8ba6ca3dbf44a4447f47f76e66be95c2771385dfb093cc001584dd7e41fa1b344fc254dc45b3aa31b900b931b14e7e9bab3e9c8268c1b5e2addef501a2f7e8333d3a8c2f135a05a11fb64a0ebd45e01bcac4b8f0d450c89aaaac2706ad63996a030fb3505da417c50741354af8fa386d43dd309", @ANYRES32=r3, @ANYBLOB="040001000000000008000600", @ANYRES32=r4, @ANYBLOB="10000600000000002000000000000000"], 0x3c, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:36 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) unshare(0x20040000) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a000000000000000000000000da00000000ffff00000000000000000000000005000900000000000a0000000000000000004e00000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000b9d03ccbf5e9b4ce2711cbfedd93ae38b6c6f9b5d80e38a94cfffcedb5f69e2778c442cc7e87554f94d23cbf1fefddbde5a1d301dab2d2455f0940d2df47f9c2b6c6bc00e0dca30d12a61784d104f709652d8e48ba8f1b58937f66406fd911e46c273bc9d345c0cc5716c46e5be5d934ee46051a63ef0637b2e64dd66d48cc95ad8e7f7c4d54540ad480598038b3684a4227bafebee861a019e59b576a10b3c7742065b8e8df0ebe864004df0e893b1ed252824ef55e4007e2373fd05405e0ebe1cc42ff7ba551e6d128c17f7f593009ccffc39c6308c4b64292f3da4ce5c6e087632aa1aeb988b7bc943e9fa6e8119e4088e6ebd56b"], 0x98}}, 0x0) 00:16:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:36 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 981.355960] audit: type=1400 audit(1560471396.720:5705): avc: denied { create } for pid=21333 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) 00:16:36 executing program 4: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 981.553772] audit: type=1400 audit(1560471396.910:5706): avc: denied { write } for pid=21333 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x22000, 0x0) getsockname$unix(r1, &(0x7f0000000400)=@abs, &(0x7f0000000200)=0x6e) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x4) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) r2 = open(&(0x7f0000000040)='./file0\x00', 0x2401, 0x80) getsockopt$inet_buf(r2, 0x0, 0x20, &(0x7f0000000080)=""/255, &(0x7f0000000180)=0xff) [ 981.948428] audit: type=1400 audit(1560471397.310:5707): avc: denied { read } for pid=21333 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:37 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/zero\x00', 0x40000, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x21, &(0x7f0000001700)="6f2625a3cb625b075b422cfd7a8b96ce2527eaa40c7f4f20d8c18bc680b5e07c3759df678cf304bd553e52bf0e225ab2b4e76daa71f7d6249f209a4d88918f59af81fea7fa3e1f802fef6503a5f989a2f884363c9d506f5192fad1540109a1b4439a994d5c2fd3464fbdc9bcded48df341b263878a209fc76673c18ccf8750a21996868b7731bee7839eb3ffb3474f87d1ec1aecbbc3d9d9c6864268fcd55f42073520836e9123d47b343cc3f058588902298daea9fe0d35a21e1e719408a43ab8bc63a1c93d5856c2542f5e975547eeed19daeec4d836f61c", 0xd9) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:37 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) arch_prctl$ARCH_SET_GS(0x1001, 0x40d) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:37 executing program 4: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:37 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) 00:16:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x2, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:38 executing program 4: socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 00:16:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75705f69643de8aab14ad94c2df243b4fafb3bee8b0f657b29e80d5dfa2b30a8ae66117cf07236c0bf9162e95f8a851bdff3224de8eca14f2831ffa0983dc1c4ce8e36b0ae44e02c1848fe94c6b612d1f159c0e21562b1559441602de5846e97b30b81c500008e4cbfec0b737c7cddde061abcf245f04d72c4d4ba687eb56a23f033b765bf3901626bcf1bdb9f546598a85ac99434b512d6ece7185a8143b7e775fefe6270194fb1e6e7187f6ae6086272fefada78e640c67bbc178dc77606ab30b38fc1249203d6a340b04f29fe609bd8920ba188360749b1e9e93d40b78a063aa13ec817", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000180)={0xfffffffffffffed5, 0x0, 0x8}, 0x10) 00:16:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:16:38 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="02030003130000000000000000000000050006000000fd000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000986169f9075be24a913888dcfd287e2121b7ea9d80b4"], 0xae}}, 0x4000090) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x230080, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f00000000c0)) syz_genetlink_get_family_id$SEG6(&(0x7f0000000100)='SEG6\x00') ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x401) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000280)={0x0, r1, 0x1, 0x7, 0x9, 0x2596}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000000)={'icmp\x00'}, &(0x7f0000000040)=0x1e) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000200)) 00:16:38 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, 0x0, 0x0) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:38 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/icmp6\x00') setsockopt$packet_buf(r1, 0x107, 0x7, &(0x7f0000000140)="3acf55982f0a5166f3d73ec07dbc98f187d0218695d822e16b8df6ea5c78e0e7e99f147fcff37dee055bcc7fd045ec2abf2a54b00becac6f90af0f3d7f0c3246a795cb8a9b4f32f3", 0x48) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000180)=0xc) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000540)={0xa0, 0x0, 0x2, {{0x2, 0x2, 0x5, 0x8000, 0x6, 0x7, {0x6, 0x0, 0x40, 0x2, 0x0, 0x10001, 0x8, 0xfffffffffffffffc, 0x3, 0xffffffff, 0x56, r2, r3, 0x800, 0x8}}, {0x0, 0x4}}}, 0xa0) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000480)={0xa0, 0xfffffffffffffff5, 0x6, {{0x5, 0x0, 0x7, 0x907d, 0xc6, 0x7, {0x0, 0x200, 0x30000, 0x2, 0x20, 0x7ff, 0x8, 0x100000001, 0x9d, 0xfff, 0x7, r1, r3, 0x1ff, 0xfffffffffffff9d4}}, {0x0, 0x4}}}, 0xa0) 00:16:39 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) [ 984.138743] audit: type=1400 audit(1560471399.500:5708): avc: denied { create } for pid=21400 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 984.303392] audit: type=1400 audit(1560471399.660:5709): avc: denied { write } for pid=21400 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:39 executing program 5: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x101) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 984.805818] audit: type=1400 audit(1560471400.170:5710): avc: denied { read } for pid=21400 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, 0x0, 0x0) 00:16:40 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockname$unix(r0, &(0x7f00000000c0), &(0x7f0000000140)=0x6e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 984.916648] audit: type=1400 audit(1560471400.270:5711): avc: denied { create } for pid=21400 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(0x0, &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:40 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 984.932231] audit: type=1400 audit(1560471400.290:5712): avc: denied { write } for pid=21400 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:40 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x20000, 0x0) r2 = openat$cgroup_ro(r1, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000140)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x1) bind(r1, &(0x7f0000000300)=@tipc=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x4, 0x1}}, 0x80) write$selinux_create(r1, &(0x7f0000000680)=@access={'system_u:object_r:devicekit_disk_exec_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x6}, 0x4f) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f00000000c0)={'mangle\x00'}, &(0x7f0000000200)=0x54) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000380)) ioctl$TCSETS2(r2, 0x402c542b, &(0x7f0000000040)={0x1, 0x5, 0x3872b0b2, 0xde3b, 0x5, "93d759d6d1ed4ba189492f613d3cd63c82b6be", 0xf8, 0x9}) setsockopt$inet_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000480)="b04edb8a45f96a00198545e0fbd9feaacc2eb6d62239ca15891185cea2d7711c42b5a989aabab2e45599f6caf2491b085ae9d7451794d192f20f0b9e649b0a8988110f0e41b421cd4104781a983bb840bcebd33decd3fc5b7109509ffd2cbac74bcf7c2153530e312029ee366a35e69462bfc2201767ae1216592193c0016e3cc74f9e8d6b0b5a72eeb5441f288914404ccf823f1f1c2a9ba67879a2b1", 0x9d) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="020307031500000000000000fcdbdf2505000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a000000040000000000000000060000000000000000000000000000000500000000070000000000090000000000000008000000000000000004000000000000000016004e240000cd51b4e3a05edc1d8d"], 0xfffffffffffffea2}}, 0x0) 00:16:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x2000, 0x1) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000480)="3760d605fca329c83ba1bef7ed2841f2702b4eaa7da44c27031a294d5e50a2c2d0747cc7040a391d4484675b60f5d2fc8d279d8d8fce558494d5f8e6cccab4d49445cfa71240b111bcd192aa4aa8b64ab691b2d799f88e5eb9c52c3d59a7bb4af3c8a5dc9b5fa34f4a113f311a1dfb33c85a0a7d430a7b8ac3221f1edd9ef5ee8b05cbe2939947b8458198e35f37987e6785c41f4261515527c2b191b140ff19a04982d21858b69d41f6e0435081b3bb2d53488b9211161e20b358e99f1ab7cfd57ccc2b79", &(0x7f0000000580)="bde956dd536caab4b0bb02159025d44bd869f3d5846c21246f51b8e2837386e4370d97f8e1f64860c31578b1ce5c3a16aaa702e829a2449ba7b3df20cda6bf622ef136ae509040668b2255030b9a24ec988e485dc771da25c5e1426af9", 0x5}, 0x20) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="dcb740bce78a969566643d", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000240)={0x28, 0x2, 0x0, {0x3, 0x80000000, 0x100000001}}, 0x28) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000040)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000340)={0x10000, {0x8, 0xfffffffffffffff8, 0x2, 0x0, 0x7, 0x7}}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) write$P9_RREAD(r2, &(0x7f00000001c0)=ANY=[@ANYBLOB="1e000000750100130000001331bd9dedbd596e8779355b6cdb55cf4fc999"], 0x1e) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:40 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) 00:16:41 executing program 5: r0 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x2) setsockopt$EBT_SO_SET_COUNTERS(r0, 0x0, 0x81, &(0x7f00000002c0)={'nat\x00', 0x0, 0x0, 0x0, [], 0x7, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}]}, 0xe8) accept4(r0, 0x0, &(0x7f0000000200), 0x800) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x57, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:41 executing program 1: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in6=@remote, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) getresgid(&(0x7f0000000240)=0x0, &(0x7f0000000280), &(0x7f00000002c0)) fchown(r0, r1, r2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:41 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) 00:16:41 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(0x0, &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:42 executing program 2: r0 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) fcntl$setflags(r0, 0x2, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000280)={0x7, 0x7b, 0x2}, 0x7) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INIT(r1, &(0x7f0000000180)={0x50, 0x0, 0x3, {0x7, 0x1f, 0x4, 0x4, 0x7ff, 0x8, 0x1}}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:42 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, 0x0}, 0x0) 00:16:42 executing program 1: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/policy\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="02030006f5a5609237a3f883330313000000000000000096000005000600000000000a0000000001000000000000000000000000ffff00000000000000000000000005000900000000000a00000000000000000000000006000000000000000000000000520000000000024e5a0000050000000000050005000097c8000a00000000000000ff02000000008000000000000000000100000000000000008b4c6d725b4f910c673a41a0cfc3686e8de27a8524cb1a9189a64548bcae284457a314fa5be4f19894c8db688c8ec7f7e33878d75648a2c8d93a6d5a"], 0x98}}, 0x0) writev(r1, &(0x7f0000000180)=[{&(0x7f0000000100)="fd604d9a3ffb29ff976792c70b5a264e9cbb3e034d57e58dec69794252df9479b1807aff8d96799d29b8762f5f74e14cb62585ff58c953be485166e44db20806584a6c6736d3eb96380bb7da9713", 0x4e}], 0x1) 00:16:42 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) close(r0) 00:16:42 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0xfffffffffffffffd, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='@\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) tee(r0, r0, 0x3, 0x0) prctl$PR_GET_DUMPABLE(0x3) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/mls\x00', 0x0, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0xdcbd796f6c7d1183) 00:16:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) 00:16:43 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udp(0x2, 0x2, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f0000000140)) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:43 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(0x0, &(0x7f0000000180)='security.SMACK64MMAP\x00', &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000008000a00000000000000f6000000fe819a20000000000000ffff0000000000000000000000000aff0800000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff02000000000000000000000000000100000000"], 0x98}}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000001c0)="ae86f8c710697d59d32f474d9508f0447dbb7cca62c7787e34bbe97346425d201cc01d660ae564c157ba083158f0cceb77260935ea933eb8b958eb94ceb0960ef91d4b20b025ac87bc4e8c8eba4c21d82bcf265b0871e3670987e115e88bba24a0aaf4be0c926779bd147a0d143f3c20a4fd28b0401298c220764f887e75238dc3d5ad313706aa04753b1d47a41aeea655f01531de83307d4934f362ffc72c9f64ece84eac3aaf42c51cdf7ef03c5f6c3a12985f442fbada48d83294fe0b12bc6e8868f6653d6ae515e5c9097b7735574bad11870105bc3a03176e94ab9db3c38b9f4b3df61613b05441bef55111d53c1ab05384f16e1df74315abf44ed9b6bc") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x2200004, 0x0) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)='security.SMACK64MMAP\x00', &(0x7f0000000300)='cgroupmd5sum\x00', 0xd, 0x3) write$selinux_validatetrans(r1, &(0x7f0000000140)={'system_u:object_r:modules_dep_t:s0', 0x20, 'system_u:object_r:ping_exec_t:s0', 0x20, 0x3ff, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x7e) 00:16:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) 00:16:43 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0b3f387be0ff") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) accept$unix(r1, &(0x7f00000002c0)=@abs, &(0x7f0000000200)=0x6e) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x2, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x14) 00:16:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x208000, 0x0) ioctl$UI_DEV_CREATE(r1, 0x5501) r2 = dup2(r0, r0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000040)={0x5, 0x1, 0x0, 0x1ff, 0x6}, 0xc) ioctl$RTC_VL_CLR(r2, 0x7014) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 00:16:44 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={0x0}}, 0x0) 00:16:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) 00:16:44 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:44 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup3(r0, r0, 0x80000) sendmsg$nl_netfilter(r1, &(0x7f0000000580)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)={0x208, 0xf, 0x6, 0x429, 0x70bd28, 0x25dfdbfb, {0x0, 0x0, 0x5}, [@nested={0x1f4, 0x1f, [@typed={0xc, 0x80, @u64=0x1}, @generic="2fad571ab7c0fb5da1ddabd15f17615d7e95e554025e36d2d5e456a040538139a174d5b4d87d4e3ddd354a5a3f24882f9d66e40b9fb0508856135c663cbe117458bb5a9ab6c2d05bd4d7bc81886ee0232c8a173c180c41bc6926f406a5d4f9c9e0718d219fdb7e1aca08daa946fd07fc1aa3d75a13962010706e0656df98302d70b30537a06970b6f722977c5997e06c08f36005b279e67facbe756b73e18583be2832e73e27a5d7a663f6ea79d334", @typed={0x14, 0x54, @ipv6=@mcast2}, @typed={0x14, 0x44, @ipv6=@empty}, @generic="3a9f15e2de39e953b5362c381b", @generic="34e15a226a37cc88798dd6b06b640e668c946dbd536cf18f9f33529c006ce92ba0e84c716b1c9bac079b6ce4c3f7ad37fe3b730e76896fa94c9b86edb03ea4f72673c81cf5869f8f0b234c8782a778efaf5ecb4847d8f2cb64e92cbddeec3c73ba6c6a38ff272933c8bd15dbd4f122d6e06051ddb81cad", @generic="8c6e2af54a41950aa58d96b3b4512dde1da3f438f9307883aea97f5134df56e07238342aa6b63bf7f17ec2b753ab14ab158a15112c5d73a197b295d6574eb73b258920ff38a9566d2e727304916ccdadcab34a1aede242c2d0659f15a552d12209e011c6c8b09573228170e956b2e4772973fe0046e5ddcafdb2cbdb5b0df06310f5d8519a32"]}]}, 0x208}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") socket$netlink(0x10, 0x3, 0x15) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 00:16:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000080000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000002d31b66300000000010000000000000000"], 0x98}}, 0x0) 00:16:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 990.124347] audit: type=1400 audit(1560471405.480:5713): avc: denied { create } for pid=21545 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 00:16:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_WRITE(r0, &(0x7f0000000180)={0x18, 0xfffffffffffffff5, 0x7, {0xffffffff}}, 0x18) clock_getres(0x2, &(0x7f0000000040)) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x0, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:45 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x400000, 0x0) recvmmsg(r0, &(0x7f0000002e00)=[{{&(0x7f0000000240)=@hci, 0x80, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/202, 0xca}], 0x1, &(0x7f0000000400)=""/66, 0x42}, 0xe6}, {{&(0x7f0000000480)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000000600)=[{&(0x7f0000000500)=""/156, 0x9c}, {&(0x7f00000005c0)=""/46, 0x2e}], 0x2}, 0x8}, {{&(0x7f0000000640)=@hci, 0x80, &(0x7f0000000980)=[{&(0x7f00000006c0)=""/191, 0xbf}, {&(0x7f0000000780)=""/112, 0x70}, {&(0x7f0000000800)=""/244, 0xf4}, {&(0x7f0000000900)=""/106, 0x6a}], 0x4, &(0x7f00000009c0)=""/135, 0x87}, 0x1f}, {{0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000a80)=""/134, 0x86}, {&(0x7f0000000b40)=""/94, 0x5e}], 0x2, &(0x7f0000000c00)=""/4096, 0x1000}, 0x800}, {{&(0x7f0000001c00)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, 0x80, &(0x7f0000002d00)=[{&(0x7f0000001c80)}, {&(0x7f0000001cc0)=""/4096, 0x1000}, {&(0x7f0000002cc0)=""/43, 0x2b}], 0x3, &(0x7f0000002d40)=""/159, 0x9f}, 0x4}], 0x5, 0x40002041, &(0x7f0000002f40)) r3 = getuid() ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000140)=""/187) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000002f80)={{{@in=@dev={0xac, 0x14, 0x14, 0x29}, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x9, 0x4e21, 0x6, 0x2, 0xa0, 0x80, 0x7f, r2, r3}, {0x0, 0x3, 0x5, 0x3, 0x5, 0x1, 0x3ff, 0x8}, {0x1, 0x42, 0x7ff, 0x5b}, 0xffffffffffffff7f, 0x6e6bbc, 0x0, 0x0, 0x1, 0x3}, {{@in6=@empty, 0x4d6, 0x3c}, 0xa, @in6=@mcast2, 0x0, 0x0, 0x1, 0x0, 0x4, 0x3, 0x315}}, 0xe8) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 990.536640] audit: type=1400 audit(1560471405.900:5714): avc: denied { create } for pid=21545 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_crypto_socket permissive=1 00:16:46 executing program 5: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000380)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000200)={'ipvs\x00'}, &(0x7f00000002c0)=0x1e) fgetxattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.impure\x00', &(0x7f0000000100)=""/224, 0xe0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000300)) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)='\x00', 0x1, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:46 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup3(r0, r0, 0x80000) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0207030313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000002000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0xfffffe9b}}, 0x0) ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f0000000180)) r2 = dup(r0) ioctl$PPPIOCSDEBUG(r2, 0x40047440, &(0x7f0000000140)) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) 00:16:46 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x62f5) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:47 executing program 5: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x800, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffd) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000140)="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") ioctl$TUNGETFILTER(r0, 0x801054db, &(0x7f0000000000)=""/42) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:47 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) socket$packet(0x11, 0x3, 0x300) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:47 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000180)=0x0) ptrace$setopts(0x4200, r1, 0x10001, 0x100001) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x80, 0x0) ioctl$KDMKTONE(r2, 0x4b30, 0x9d) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) lsetxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "fc9115a0f4a5f8c670c3f869db11188e8ba455be"}, 0x15, 0x1) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:47 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:48 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:48 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:48 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x80) r2 = dup(r0) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000040)={0x7, 0x10, 0x1, r2}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)={0x2, 0x400000000000003, 0x0, 0x3, 0x2b, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_key={0x1a, 0x9, 0x618, 0x0, "55dfcebcafcd9e101c36b7c82ae7be318f1ef116fc4624cb1b1b715aa06661d2ff4af16fecfa9ef47738371cb5d78eb9dce7db08ce30b5d34e9c400469b6e9bb6bd7cbc4dbda63f92c8cfaca413df58bc4adebc527c4928af722884d595881d5d86b2efbfd7dd59486997021dcd5a70e01706a7a4918807d59acb07f1c54013da22704353bbe9e75ada4cb8b1ac1881ff28323991289b8c93491b6fec3150476f2d3baa5959428d38ccad5d943e91c4284c4306b74bf4dc679dd1030b96ce349088ba5"}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x158}}, 0x3) 00:16:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:16:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) read$FUSE(r0, &(0x7f0000002000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000180)=0xffffffffffffff1b) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:49 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) 00:16:49 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x248d, &(0x7f0000000500)="11dca5055e0bcfec03000000a2d82182235bb1cde1edd36ff8040200e478ca9fdd6753c9302ea09a8f1676c31a647d11e635357b41a110cb7dcf874b2862625019ff8fd9b14a80fda882cc7febda525753d198b554ff3fede48820d47ffd73be6c5440dc820ab39d8bf8af5b50fd657bf9be060af89dc0864660f616834445ad329e71f3f7ee0da7077138ec89d38957aaa318c60a8eccdc9fb714fb1b") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000a40)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000000b40)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000b80)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000c80)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x14, &(0x7f0000000d80)={@remote, 0x0}, &(0x7f0000000dc0)=0x14) r4 = accept4$packet(0xffffffffffffff9c, &(0x7f00000010c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001100)=0x14, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001140)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000001240)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000001280)={{{@in6=@ipv4={[], [], @loopback}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, &(0x7f0000001380)=0xe8) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000002f00)={'veth0_to_bond\x00', 0x0}) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000036c0)={0x0, @loopback, @dev}, &(0x7f0000003700)=0xc) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000000c0)={0x8001, 0x3, 0x1, 0x0, 0x0, [{r0, 0x0, 0x400}]}) r10 = open$dir(&(0x7f0000000a00)='./file0\x00', 0x10100, 0x10) openat(r10, &(0x7f0000000cc0)='./file0\x00', 0x800, 0x10a) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f00000009c0)=0x7b72951f, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000003ac0)={'syzkaller1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000003b80)=[{{&(0x7f0000000040)={0x2, 0x4e22, @remote}, 0x10, &(0x7f0000000680)=[{&(0x7f00000000c0)}, {&(0x7f0000000100)="3487958f7f3a91904c7c96e796e972b49a60ffe157d9a3a97becfdf357d9d786549b862b04fc4c65a8b164b402741581c985ca631a25265b5c05d0e1e0ffa5ad614ac35c52d45c91e22b53fafbb5856c4f8b5f6c2453", 0x56}, {&(0x7f0000000180)="c20d3dccabb06d2445ee0881ae0ce719aae1fc714764e26c74c6c3f1e8f0bd713c043e7c80ee91f9720e17966b14bc0d", 0x30}, {&(0x7f00000001c0)="e32dc18bbf39d580bc48ae19347a84d7e49a7b89", 0x14}, {&(0x7f00000002c0)="65f53058c51038f30e17681a2308547080845a986d56487d48d6956dad42e620db696f7c2710c6aef6262e210da8c7b51c697f3e81ce79131690a479a6ef78c418b6b68f24713a67e32b60a38ca58214ef302b6951745ad148250c62b3f9ad54d2c92df01f38d166e027e7fdbae565decbd18524a71d64426b2a2921e890c24b2e17c4da7416edae47e5135f9e1002dff00fbe62e4f7c0ccc813df88fb2bfb386cf624bf71b58fe8a21783d8c63085a5742934c12f00db2f8b844252ef873c0c43e5eef33cb7838b3e6c6c453f849b08086dfebff31d4f25229d811262b1f4bf489070d3cb10c88fd6d631d4edd0e65796386aea11", 0xf5}, {&(0x7f00000003c0)="d954c0afcc3f5ce9f7301799ab86b07443c1ef921849c461555b0cb49d0bbe6b927f0a5f0830af5be2b971e46bf6adf321609ca0fb791e86d7ef648bceb1f1bdbdbff428fc5bacc4f5b347f29ed4", 0x4e}, {&(0x7f0000000440)="b70832c91309b3250c4ea9abf01b0e26ef2337760cba70f8e80d5d3ba8a08dd05049f44fede86a92f579094ca63f9c4a0fc1bd7affe516cae8fae71af73763d144db74a1e638b608546025fc4d6e75ba2c7e0022b7117a3faac4319fac6bf9ae3606ebf9a24a40", 0x67}, {&(0x7f00000005c0)="a97636be23e9ab05d90d4ec61425aebac50eac97c2c674f7f7ec4f861d641d88986e29b476e31744f399db0ac60d05b96368a482032796b203dce77b58da6db6cc30d0e1aa70d57cdf36389442aa6a94fbcc3c82c54a8eda2dfe579fc80d4a8f67ca6e94ed40ee715db65d37cde20368f3ce47ecbbdcd9e3edcc7cf6734dcba92e55a8fbeb6fa14f2e996e87361d42032098b13606a0eb8180e8", 0x9a}, {&(0x7f0000000200)="803d626027195952e702329170e4096ea9566513bae3e429258e09473fcb7c3bf452807ab38325e96366bdf636", 0x2d}], 0x9, &(0x7f0000000740)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x7fffffff}}, @ip_retopts={{0x80, 0x0, 0x7, {[@cipso={0x86, 0x60, 0xffffffffffff8001, [{0x5, 0xc, "641aaa516dbfe3859637"}, {0x6, 0x5, "a5a4cc"}, {0x0, 0xa, "f97db41eba98b9e4"}, {0x6, 0xb, "bae2489c9e4bd1a8bf"}, {0x0, 0x12, "d362e372ee02ecf095df87af9ab43428"}, {0x0, 0xa, "5cf776e2039cbafb"}, {0x0, 0x6, "714a1707"}, {0x2, 0x12, "4efe2d2881bfb883c2f4ad430fbbdd08"}]}, @lsrr={0x83, 0xf, 0x800, [@broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x15}]}]}}}, @ip_retopts={{0x134, 0x0, 0x7, {[@generic={0x8f, 0x9, "5c111d6d0e585e"}, @cipso={0x86, 0x3e, 0x0, [{0x2, 0xc, "38d1c2a1763dff7fc51d"}, {0x7, 0xa, "5b609a4dc0441f28"}, {0x3, 0x4, "da35"}, {0x0, 0x6, "1f794f76"}, {0x6, 0x10, "275ff46536ec716077464a0006b9"}, {0x6, 0x8, "8c3f520bd013"}]}, @cipso={0x86, 0x56, 0x3ff, [{0x7, 0x3, "97"}, {0x7, 0xb, "6dced05dbb688e76b2"}, {0x6, 0x9, "166014c5e9b8c8"}, {0x2, 0x11, "67aee7a6cd12891283813d6121e5e7"}, {0x1, 0x8, "88f77ae092ed"}, {0x6, 0x9, "c6c065a309954d"}, {0x0, 0xf, "daf8999a1516f9a59afd074ac6"}, {0x1, 0x6, "5179186a"}, {0x2, 0x2}]}, @cipso={0x86, 0x5d, 0xff, [{0x1, 0x10, "6a33824184cd183a57c7003794ac"}, {0x2, 0x11, "a0ce8cec177346f4442b00932195a5"}, {0x7, 0x5, "20c8a9"}, {0x6, 0x9, "c270880283f952"}, {0x7, 0x7, "99a55f0d2d"}, {0x5, 0x11, "8b85344ba81203286232a8d94a0c34"}, {0x2, 0xb, "6e63742a9e948c956c"}, {0x0, 0x5, "27f78b"}]}, @generic={0x1, 0x3, "fe"}, @ra={0x94, 0x6, 0x4}, @lsrr={0x83, 0x7, 0x6, [@multicast2]}, @ssrr={0x89, 0xb, 0x1affda59, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2]}, @cipso={0x86, 0xb, 0x1, [{0x0, 0x5, "2feab4"}]}, @noop]}}}, @ip_retopts={{0x20, 0x0, 0x7, {[@generic={0x89, 0x10, "9b50b658a860dedcf56475a60741"}]}}}], 0x1f0}}, {{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000940)="ca360349c8527111d262ed1ae42c007071acf8e49e3d6615c164b9b0a301c77b3fd918d7d7c0479622e2d9a28aebfbde2f73d7878e2dbd68b6ad8a8987ac5e96562317210c7cb3ef8cf0f8344308cdce20d5607fa46a47e7ed3faf92a05372dd389cc4ba90a24d0167", 0x69}], 0x1, &(0x7f0000000e00)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @loopback, @dev={0xac, 0x14, 0x14, 0x26}}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x1}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @empty, @broadcast}}}, @ip_tos_int={{0x14}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xa71}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8001}}, @ip_ttl={{0x14, 0x0, 0x2, 0xb31b}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x9}}, @ip_tos_u8={{0x11}}], 0x108}}, {{0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000f40)="c376a721ca4f60010c07086a1f5ccf7e66ac7918d96ec6", 0x17}, {&(0x7f0000000f80)="3521416f8dcb7c919672dcb336fe3ffbfe522bff792c086fe9881580a788007da5d3d0a8a5641603acd0e28c3d01fa4632b5b4e2963f78e3a2821fdc1f874fe7cde257f8213dec8061da5ef7fbcef91ab980418d883db6dc6674915d568fdd0b09bab7ea50be7d414b72a0d2526c0f136639565355f3ef37140bf263b55d4d177c2bd043f2be5db0f1b35436bb1c8ec401b58299324e508f4c174dc098eb0600d595e35b21bd9759f37277e54d090c4bc1e25e9dfce44e1f7db33b36a360326b57dbb1f88e1e60a28a003ad21d8a552b7b53da5fd9d50a0ffad0ed2111ba14", 0xdf}], 0x2, &(0x7f00000013c0)=[@ip_retopts={{0x40, 0x0, 0x7, {[@ra={0x94, 0x6}, @ra={0x94, 0x6, 0x7}, @end, @generic={0x0, 0xf, "3db4ffba92c8c7998b706349f1"}, @cipso={0x86, 0x11, 0x63ce, [{0x0, 0xb, "67325ceeeeeb72de46"}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @multicast1}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @dev={0xac, 0x14, 0x14, 0x1a}, @local}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0xcdfb}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @dev={0xac, 0x14, 0x14, 0x15}, @broadcast}}}], 0x100}}, {{&(0x7f00000014c0)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001500)="02667ec0d42a973bc0f90be8a2c248c5eea4012a50e985537ba84dd7fcf93504c9265897fd163a", 0x27}, {&(0x7f0000001540)="9e5c10ad51c365f0de5e2714b5a1a206749a97dba9493d4f18d81eb692549ff23bce91e484688f00c7155d775ee37690bba04be0e643d684bb4f37bb72e9477a92d9bf1416cb23c7a5982764618d9159f4e8e910c799061db09d94ed592abc4aa77ab9c598f84a8ab0bcf77b9f5fc51189822bcb92", 0x75}], 0x2, &(0x7f0000001600)=[@ip_ttl={{0x14}}, @ip_ttl={{0x14, 0x0, 0x2, 0xff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7ff}}, @ip_ttl={{0x14, 0x0, 0x2, 0x800}}, @ip_retopts={{0x8c, 0x0, 0x7, {[@ssrr={0x89, 0x7, 0x0, [@broadcast]}, @noop, @ra={0x94, 0x6, 0x7}, @end, @generic={0x7, 0x12, "5c8582092fdb6b8aaccebbd14fa8ca40"}, @lsrr={0x83, 0x13, 0x2, [@rand_addr=0x7, @broadcast, @local, @dev={0xac, 0x14, 0x14, 0x26}]}, @timestamp={0x44, 0x34, 0x1, 0x0, 0x10000, [{[], 0x74a2}, {[], 0xfffffffffffffffe}, {[], 0x800}, {[], 0x4}, {[@remote], 0x81}, {[], 0x4}, {[], 0x2}, {[@loopback], 0x2f}, {[@multicast1], 0x9}]}, @generic={0x89, 0x12, "45dd8a9a06fa2e036d0fdad32119a1a7"}]}}}], 0xf0}}, {{&(0x7f0000001700)={0x2, 0x4e24, @remote}, 0x10, &(0x7f00000029c0)=[{&(0x7f0000001740)}, {&(0x7f0000001780)="fb6d9e7e9dcaf7333485c57f34085cf077bcf965eba07be1cecbc494f9e935a6e1772f283b911eeb6fb178af55379d82d9939ba308445a9ede0836b44eb7f6379f5ace6dae61ad5991a478e063986ca98d7b52b1a440621b4d1b73cfe78449bbe3aa83562ff6fdaa7220673061c5985c01819e7251b92b6aa385c499806b06e7f03866792bfce3b484a5626194de432b80744dff41b1fab36121f80c04dc", 0x9e}, {&(0x7f0000001840)="3578cb4f0b286b0b66eaed6d171661db4a16204128368ce7a8af65c8d649bcf2bc64e1b74637cdfffed5e001b125409f843f001d82403b0d15287c87b3d09df88e441cdc91235ee63db3dccc848aea0618b29d6c78eed798a615941b248a4a80af892079fa0669fe5b49de0e30242297317268a5f661f4496f5560", 0x7b}, {&(0x7f00000018c0)="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", 0x1000}, {&(0x7f00000028c0)="6e4927d072f823dc1718d7e3dd0e7649e594e94cafcf57", 0x17}, {&(0x7f0000002900)="7ababd92ec1252592c939f8b6509bfbd9c6cf9ff908bc87840a3fb66beb2c3d022aaa79c71d8e9460f8c8ce820bc1cae474659ba68e67dd6a3b15c26967d0ea4c00704efd86f16ad410919f569fbe562749b623f6db4053d2bf967d2bc89522a7218f7f1d41d626bcced1900941b4d4b87f0cf3b039fea4f174620c6946a543ff9d66b6f65a105eb314dbf308e2d6b752c70ab81ef556da51f456296372ad88e", 0xa0}], 0x6, &(0x7f0000002a40)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x5}}, @ip_ttl={{0x14, 0x0, 0x2, 0x7}}, @ip_retopts={{0x50, 0x0, 0x7, {[@noop, @lsrr={0x83, 0x13, 0x800, [@multicast2, @local, @multicast2, @multicast1]}, @generic={0x0, 0x3, '%'}, @end, @noop, @ssrr={0x89, 0x7, 0x7, [@broadcast]}, @ssrr={0x89, 0xb, 0x3, [@remote, @remote]}, @rr={0x7, 0x13, 0xd76, [@multicast1, @multicast2, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @end]}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x8, [@multicast2]}, @end]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x68}}], 0xb0}}, {{&(0x7f0000002b00)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10, &(0x7f0000002e00)=[{&(0x7f0000002b40)="3c82b0111d2c6b3d9d7cb7b5ee3027e9c32ea32877a08272dd3a3e3e52e951c2f17217cc8518bb6fc25da0fce2fc8068bbaa6f881f8aa00ca4693b74e9cb6da894ba48e8c3774611bd1220ffc8a5779641f7e8cb11e5e47b62545faf23a0e714b8a68ee6af7966f4dbbfa659b1dacb2944dc686dd25d65f1ca1e535f1cc9a990a5558b8f94bc304fd37a3be06005318f7a98b24d0ca344b04f5f306319258d9e1f662c7b607dbb3545cf6f4ba0a527ea13c6c7a9241349537be0248e26d1b9efded47fb6980ab561fb30bf54d0810458f58144e8a78e82ece70fad09", 0xdc}, {&(0x7f0000002c40)="220c7dd8c5fa986ddd617bc9c172b2907ede8e93b12297093101cd4ebfb5ed75199a070ca055fe57f793f581b3fe0e3f15415fe56e03003291e02fbfa8c24f7c15ef7f9ee44acdf5bcdbb92317b7076ce5d809e160f3558ab3939e75b9d4c5d98fdf058f03726b3a6f6474a0dcefa488ff95a70da2145616d176c6d2de9b349e7627cdc0610bb4e1", 0x88}, {&(0x7f0000002d00)="1730d1ce4783859090d4f53b064f1598db54a0f7", 0x14}, {&(0x7f0000002d40)="2a593f1183ba8b87482cf82024cd9868156c38d19ed525b8ce609d54fb6871fc2e9def78060a176cd9b25bd5321d7f733dc898474d96bcc9601cbad2907562eeb3b117c06a3410e7e6346487fd3d295480d96be7e6c9e5ef289b3580402d85484befea07edf0192412e83ceba1137b5d91142ec6c191da8105fd61728c5610a07cacdb4c671120b80217a8ae9b729b4c4dfa", 0x92}], 0x4, &(0x7f0000002f40)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r8, @multicast1, @dev={0xac, 0x14, 0x14, 0x1b}}}}], 0x20}}, {{&(0x7f0000002f80)={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000003600)=[{&(0x7f0000002fc0)="69682ef146ebb2c69eb92a47f61f5852f67bc0269cbe4440370b81c58245b82ace8094b44e2e7cc10ec31e62a5cbf538018d26bf8578526a19239139f69d5c15ecb0abc8adb595bd512060ef3001b279cab18f5ff5c2bd16c38dcd6152b1fd2faf18af9237d9ce2842cc92a969e5faaed55c816c6bcc88d5fbbd46d52601237812ae42727c70b9cd959ebab93f56208375265bff2e3b45512d308de37fdf0f6e2717359d602a08fc3ab2cfa71dfa98fb8e4c9e407854750161793f32e28a0c74ac82f7d7a9", 0xc5}, {&(0x7f00000030c0)="0799766ad66825d0ee95ba8c00dd903e7a678a5070cb04939c6bfc46c6ddf517b148537503db8255affce8473a87cc096abc460f2cbc6ec507a84a3a684c5c7a4fb079e80a1ed7585c729930bf94ab67b414d2c44f02c0ad514d73541b1d72424e7621c22567b4bc2a011274e30dd63f108bd90de143af4005f74a0278a98f0a7186086943d7fe4f6a77643e67226f6a832bb03ff5c00524e40420f3d395", 0x9e}, {&(0x7f0000003180)="4c8d62085f531286c6ea26590ab7695de143b9772a460563b7a7bb8183fc5aa44341cc65b6d618b319fd570b57c559c5c9254de3999632062fb1e2485b336676fac8f6f8eb18e10cfc3dee6cc0c85df7a323ccd6bbea110198640a192baf4b337ff8b36fab2354c2433fc137c5ab232f7cfc641e887fe63b23a5a2723541173bb790ded14936eb796651eb6e62127557dfce9cc1f2c68a42a0150d5922c3b8aa7d37a3a041eb35879982cb3f65adce06a6c11a64b7f923bf6e9351", 0xbb}, {&(0x7f0000003240)="590326af1e12499576489de391f5634db63dcef8b75cd3892db88a2bec3708f90a62143abdb6adb2eaaddee4cd9d8046b0057b02938f799c67b79969ab", 0x3d}, {&(0x7f0000003280)="0d23ad72a65f4d13fba0a42bbdb218d5d5b93d120fa7c18922931a7a3854d6cbc52d7c43e8846d6248938a762d33d4ed157d357c3769c1cbc3c95fe2aa0da115177a25b9554e961260e3968ea7a50572f7f3435b1aa7f61bc8f9bc8f75c73ae90b29894c8db1d06abf6e8305cfd7a200ab0979541fb49323350204b6bb31f19340c1e9353bbb3f0bf40c9622d4deb8876e48c99a0fbee1b85e03af03b116775e4d272787ec9759ee54d7e0e08e62cf232431eab01a2eacb698b87f702cbc8f04b5687d1098828a88e8b97afb932fc315b7c08d771fea16dd31e144e3a96eea7affff9144fb92df28", 0xe8}, {&(0x7f0000003380)="d16573031163c6a923677a2573ba93f7194c19f9fa95617f630db167d1f9da51c92840d5819d21f571c1a920fb644914f947da245a244cdaff37775c7db423a58f5d462a15dc500689252c34ad683fde8ceed7c2df5f9c869ec00f6811363a2e9d49cc7c0b98422b65ae1654baf665048a623c43b32d4481a6647afb08a18ee3e2e97f7fa346ed6c43c4b7f8d6cd76163e8653d3fda5ee4a46bad58babd74f005c", 0xa1}, {&(0x7f0000003440)="4b5909e63619d452711124be796a30111efd6910c093fbd7c2c45b409e6f71ded456f04bf35da8816befed3bebfab9121a56a32a9d1fc6510078dbf740a8f167b3333165e12f200270c30b5f1d6ec970db506f516c4969210256973330520b8160d2dece2e05ed596a6ad83fae2b8736bbbce1fe4dc3a8665afa5315c358b2c7c8013b2299c8c5ab8b90686da2fcff7d2e84c4d114830b3e9643022ca5eeaa28db98f244915c0a008a363e4f91c666403477f08bc440d2de1f5a4624ab2a6f1d72e4db9f192d39acd0c9cfa4d9c763b58a2e46b4d1c5fc29505b9b90c23c7a12196c6a56904e26041d9bbb081c36bf4b44d1c33055c831", 0xf7}, {&(0x7f0000003540)="57ed43715b41e97ada6b81b07ca14e753631aa6962290ec57fc23c85afe6b255a8b3651e70a2091241c52b6789169fbb80ebb566aa5aeafddf3dd8a52e1241d972f20bc29dbabd23d0f84952b2e986037d91b3729985a8741d67a09d6e2bf67d592e34fb2650df231a0a", 0x6a}, {&(0x7f00000035c0)="217f05069be447c96acf88f965bbc55fdbad414bb9ce10faab5beda691187b705efe137ac3417fe8b67c", 0x2a}], 0x9, &(0x7f0000003b00)=[@ip_ttl={{0x14, 0x0, 0x2, 0xac}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0xa9ec}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r9, @multicast2, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r11, @loopback, @broadcast}}}], 0x70}}], 0x7, 0x8090) 00:16:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:49 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b00ff0f0000000500000000010400000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:16:50 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) 00:16:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:50 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) fgetxattr(r0, &(0x7f00000001c0)=@random={'os2.', '}self-\x00'}, &(0x7f0000000240)=""/154, 0x9a) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/route\x00') setsockopt$inet_icmp_ICMP_FILTER(r1, 0x1, 0x1, &(0x7f0000000180)={0x7}, 0x4) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:50 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)={0x2, 0xf, 0x8452, 0x0, 0x5f, 0x0, 0x70bd29, 0x25dfdbfd, [@sadb_lifetime={0x4, 0x0, 0x4, 0x4, 0x100, 0x3}, @sadb_key={0x18, 0x9, 0x5b0, 0x0, "f623b0268cbb11b27227007880105c8f89a9ca4a99ba107cb7244f9a43083275040972efd618f65732a2c608da746922085bb5ef65c2ac77a1c605ff75fcde0f6374ce39a8e4d26fb2ff5e9426d55ce748566cd4398e3e4009393db671303263e43ecbc0fae885aae3bd81e5751279f10135455d2a1d7f0e00589f4bfd8e500e250f8bea7f229e0f79b45c8330e0f7e3dbbec344468e5faa949d19388136174673ac224a5e3155b2d7ca7e2daeb951fd6135b2095494"}, @sadb_x_filter={0x5, 0x1a, @in6=@empty, @in=@multicast1, 0x1b, 0x10}, @sadb_sa={0x2, 0x1, 0x4d4, 0x5, 0x20, 0x3f, 0x1, 0x40000000}, @sadb_x_sec_ctx={0x18, 0x18, 0x20, 0x6, 0xb4, "3592971038f650ce42d19508d9507a5aa427e39868c26116bed9096a1aa38c2734d1f4e46bb02907b0b7c2e8f0d56ccf0c0377153f69aa3439ea0ac791072a5bc28085d598cededfe219921c1b419e559cd75cd6eed020f9d4e62df2b4d141b68ff20926e3d6415946a5282dd8db535f2bb4a51de3bc189e9286fe0bff92f78fedc51b8bb581ae0d6cad470ddde318c49b5215dd0056e83f071b86022d08727bf65dbd7684ec1c76208d6b0bed80cd0c745956a9"}, @sadb_spirange={0x2, 0x10, 0x4d3, 0x8000}, @sadb_x_sec_ctx={0x20, 0x18, 0xffffffff, 0xb38, 0xf2, "23fda19cd4891a1d2e6698c2629e45cf5b56591d6d78de1c5d2a5a3d4e2889375c1701a277aeb601c5082af8b6365f592cd55190be8b2ee4fd5ab663649cccf540403e0bf20d02a80e8494bbf426e08864802b993c6cfb45c050d51ed89f42500e4a22d743c5413997db57d6d025c4ea4247b4e2b322a40f45ef1ba3dadd810c8d1f398a02f50d8e53fa9ef6adb4e5989f19b449c2c7eb8193cfae21db135721e052287697675e2aa92656abefb689de31aec69ad10456e723e66b7113cf1925e9d4e3e38dc17a617851ce909024da8a39028b9c9851524405ccf1c155055fcd74452b373e3da6bd3ae8f22e7a2ec22701ae"}]}, 0x2f8}}, 0x4000810) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f0000ffa000/0x4000)=nil) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000100)=ANY=[@ANYBLOB="b28be5ca020000000400000000000000d28c168655ae390e07500811c48079c70e832a8ecee2bf255055868cf231d9b41d9b64631e8fbd1f732cdc7ea1105eb3db46dcac43eb2ff23cd71f91e0fad224f2"], 0x31f}}, 0xffffffffffffffff) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@multicast2, @in=@loopback}}, {{@in6=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) ioctl$TCSETXW(r1, 0x5435, &(0x7f0000000040)={0x7, 0x9, [0x100000001, 0x8, 0x4, 0x97b8, 0xb1], 0x40}) 00:16:50 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}]}, 0x70}}, 0x0) 00:16:50 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x80000, 0x80) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f00000002c0)='syz1\x00') pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f00000001c0)="b487221501fe1744b1decc71d7d90aba6c33e79be9ad96607bdb1fc3109ea428d1ca429b65a4407e855a209c3f08abb837e2953af706") llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) 00:16:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:51 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000180)=""/155) fsetxattr$security_ima(r0, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@md5={0x1, "a1e72fdfa7a6816cd85924ccb581fdf9"}, 0x11, 0x2) setxattr$trusted_overlay_nlink(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='trusted.overlay.nlink\x00', &(0x7f0000000400)={'L+', 0x5}, 0x28, 0x2) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) fsetxattr$security_capability(r1, &(0x7f0000000300)='security.capability\x00', &(0x7f0000000340)=@v2={0x2000000, [{0x9, 0x8}, {0x9, 0x100000000}]}, 0x14, 0x3) accept4$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14, 0x80000) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f00000004c0)={@mcast1, 0x49, r3}) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff000000000000000000db0d0005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:16:51 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:51 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0), 0x10) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:51 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) ioctl$PPPIOCGUNIT(r0, 0x80047456, &(0x7f0000000040)) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = socket$inet6(0xa, 0x0, 0xffffffff) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f00000001c0)={@loopback, r2}, 0x14) 00:16:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000400)={{{@in6=@empty, @in=@local, 0x4e20, 0x0, 0x4e20, 0x101, 0x2, 0xa0, 0xa0, 0x62, 0x0, r2}, {0x1, 0x70, 0x3, 0xa67, 0xff, 0x5, 0x0, 0x101}, {0x100000001, 0x0, 0x8, 0x3}, 0x5, 0x6e6bbc, 0x3, 0x0, 0x0, 0x3}, {{@in6=@rand_addr="e8c2b6f37bc611a77311d26a700c0b03", 0x4d6}, 0xa, @in=@multicast1, 0x3500, 0x3, 0x2, 0x1, 0x88bd, 0x7, 0x6}}, 0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000001bc0)={{{@in6=@mcast1, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000001cc0)=0xe8) setsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000001d00)={@multicast1, @multicast2, r3}, 0xc) write$FUSE_NOTIFY_INVAL_ENTRY(r1, &(0x7f0000000300)={0x25, 0x3, 0x0, {0x0, 0x4, 0x0, 'eth1'}}, 0x25) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4, 0x988, 0x8, 0x2a, 0x0, 0x70bd2d, 0x25dfdbfc, [@sadb_spirange={0x2, 0x10, 0x4d5, 0x4d5}, @sadb_sa={0x2, 0x1, 0x4d5, 0x7, 0x20, 0xe3, 0x0, 0x80000001}, @sadb_spirange={0x2, 0x10, 0x4d5, 0x4d3}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e20, 0x86d, @empty, 0x7}}, @sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e22, @empty}, @in={0x2, 0x4e21, @broadcast}}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d3}, @sadb_key={0x14, 0x8, 0x4a8, 0x0, "2f58a818b35cdcea733c99ad826aacd2c413e9183af40b43ad4c96f92549d42b3983005bf036873fa82089018019039f29711a0237338b22c6fbc630e8f4c53b212dc945f0e108b111e1ce583cc0453d14595b7bc4dcd6257a8f104ae772e15634c1b98a6706fd26327b02a0ded9e253c88f8606b2fb421df7a472bb00fc8afbc7ce26fce660c6d7652486ab68f2af122c7128293b"}]}, 0x150}}, 0x80) 00:16:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:52 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:52 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a000000000000004eb10000000600000000000000000100000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200170000000000000000000000010000000000000000"], 0x98}}, 0x0) ioctl$sock_inet_SIOCSIFPFLAGS(r0, 0x8934, &(0x7f0000000040)={'ifb0\x00', 0x5}) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000000)={0xff, @loopback, 0x4e24, 0x1, 'lblc\x00', 0x8, 0x1, 0x49}, 0x2c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000200)) 00:16:52 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x480, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x118) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="168c483847937dd2ee2f74ca9771fa7ab8f8ddaf56914e0392deafd65f8d1d1fea1835399b7f7eecd03c56c856839ea36df889bcd3150bbe4a085034f2f5b9446ae566f76450c53a735b1df0b79a8cd2d37ec7a1a5765d439ca2cc70a48e03b6cd03e6e339ef9db03de13ddc022b9fe4b15f3c5fd6308b480121dfba980f386d87100f644ea7ddc77087b1e1c76e4322268e639d8b2527724bbf8fb0d82a6c27ac046792dafe8f3c03bcee7a7e6426bb1321", @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) flistxattr(r0, &(0x7f0000000140)=""/209, 0xd1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="024c9b6676000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:16:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:53 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f00000001c0)) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', 0x0, 0xffffffffffffff2b, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:53 executing program 1: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000140)={{{@in=@empty, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}}}, &(0x7f0000000000)=0xe8) ioprio_get$uid(0x3, r0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) 00:16:53 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000140)=0x4) r2 = socket$key(0xf, 0x3, 0x2) timer_create(0x2, &(0x7f00000004c0)={0x0, 0x800000000000039, 0x4, @thr={&(0x7f00000003c0)="f1ccb92ca5c30bf0461b4ae87d9f41391302776aa1", &(0x7f0000000400)="833038b4881b4f741c6483475eec44271d628fce3d60148dca642e78fcedf0d65ba8bc718cef8d3cf107097023d9bd3909c136051062a95008e1b8dfdc924276c4c9fbc70adf31ddea777cf363d049edc34c8ce39d94d85a1de15a60d8aeb2fdb39b3dc16b1bc5314372b4f7aeffb825885aa99ddbf1f4dcb0045bcfc3f8d3d8ccddb51bc10021793fe7a4d78b614abbb39a4cd08737"}}, &(0x7f0000000180)=0x0) setxattr$security_smack_transmute(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='TRUE', 0x4, 0x3) timer_getoverrun(r3) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ffd8026e010000000000000000a654f381a085bb16446b5acadce200"/166], 0x98}}, 0x0) r4 = accept(r0, &(0x7f0000000500)=@isdn, &(0x7f0000000040)=0x80) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r4, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={0x70, r5, 0x200, 0x70bd2a, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x5c, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfff}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x5}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'rr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x9}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x10}, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x40, 0x0) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000080)={0x9, 0x5}) accept4$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14, 0x800) setsockopt$inet_mreqn(r6, 0x0, 0x23, &(0x7f0000000280)={@empty, @multicast2, r7}, 0xc) 00:16:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:54 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x400200, 0x1cd) write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000180)={0x30, 0x5, 0x0, {0x0, 0x4, 0x7, 0x498}}, 0x30) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:54 executing program 5: r0 = syz_open_pts(0xffffffffffffff9c, 0x400200) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x3) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x200, &(0x7f00000002c0)="11dca5055e0bcfec7be070432773a1a866c5fc0bb5b1109ba0fdac92f1751dfc3e8d87f95141df39d2f7619664c85374546a1709c71f8f10061536feea0715416accd823f81a21be80aea2a8b07b9fa246a38fff014c64c2f06c651d9b092be8e9cbc29635e89673db1711e9") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$int_out(r1, 0x5460, &(0x7f00000000c0)) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) 00:16:54 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='batadv0\x00', 0x10) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x17}}, 0x0) r1 = ioctl$TIOCGPTPEER(0xffffffffffffff9c, 0x5441, 0x2) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f00000001c0)={0x2, 0x7fffffff, 0x401, 0x2, 0x1461, 0x6133}) [ 999.279453] audit: type=1400 audit(1560471414.640:5715): avc: denied { create } for pid=21757 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 999.487595] audit: type=1400 audit(1560471414.850:5716): avc: denied { write } for pid=21757 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:54 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000100)=0x1) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:54 executing program 2: prctl$PR_GET_KEEPCAPS(0x7) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) lsetxattr$trusted_overlay_nlink(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U+'}, 0x28, 0x3) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000002000), 0x1000) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000000180)=r0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = gettid() write$FUSE_LK(r0, &(0x7f0000000040)={0x28, 0x0, 0x6, {{0xab, 0x2, 0x2, r1}}}, 0x28) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x11, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x88}}, 0x0) [ 1000.057241] audit: type=1400 audit(1560471415.420:5717): avc: denied { create } for pid=21757 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:55 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:55 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x40000, 0x10) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f00000001c0)=""/4096) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000140)) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000ffff0000000000000000000000000511ccfbaba26812c000000000000000000000000006000000000000000000000000ead00000000002000100100000000000020b000000000a00000000000000ff02000000000000000000000f8cca49c3887ad5000000010000000000000000"], 0x98}}, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) bind$unix(r2, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e23}, 0x6e) [ 1000.212362] audit: type=1400 audit(1560471415.570:5718): avc: denied { write } for pid=21757 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:16:55 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000002c0)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x22100, 0x0) epoll_pwait(r1, &(0x7f0000000300)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0xfa, &(0x7f0000000200)={0x7}, 0x8) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffffffffe85) getxattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)=@known='system.posix_acl_access\x00', &(0x7f0000000140)=""/151, 0x97) 00:16:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@local, @in6=@loopback}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000140)=0xe8) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000840)={0x2, 0x400000000000027, 0x0, 0x3, 0x20000000000002de}, 0x10}}, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000180)={0x3e, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x0, 'rr\x00', 0x1, 0x8, 0xa}, 0x2c) 00:16:55 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) r1 = socket(0x1a, 0xa, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r1, 0x0, 0x489, &(0x7f0000000180)={{0x6, @multicast2, 0x4e23, 0x2, 'wrr\x00', 0x5, 0x401, 0x2a}, {@remote, 0x4e22, 0x2001, 0x1, 0xfff, 0x6}}, 0x44) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:56 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:56 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0xd9f0befe8aa46e44, 0xffffffffffffffff) ioctl$FIGETBSZ(r0, 0x2, &(0x7f00000000c0)) sendmsg$key(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYRES16=r0], 0x765}}, 0x4000081) socket$inet(0x2, 0x80003, 0x2879345a) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000000)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) 00:16:56 executing program 5: r0 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fd/4\x00') getsockopt$inet6_tcp_int(r1, 0x6, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.nlink\x00', &(0x7f0000000300)={'L-', 0x8000}, 0x28, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) epoll_create1(0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/loop-control\x00', 0x2202, 0x0) 00:16:56 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:57 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000001000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000100000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) ioctl$RTC_VL_READ(r0, 0x80047013, &(0x7f0000000000)) 00:16:57 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='sessionid\x00') sendmsg$nl_route_sched(r1, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=@gettaction={0x124, 0x32, 0x900, 0x70bd2b, 0x25dfdbfb, {}, [@action_gd=@TCA_ACT_TAB={0x9c, 0x1, [{0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0xe917}}, {0x14, 0x16, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x18, 0x12, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x14, 0xf, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0x1e, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffff}}, {0x14, 0x6, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x0, 0x1}}, @action_gd=@TCA_ACT_TAB={0x5c, 0x1, [{0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'pedit\x00'}}, {0x10, 0xb, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x10, 0x1d, @TCA_ACT_INDEX={0x8, 0x3, 0x8001}}, {0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x100000000}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc}]}, 0x124}, 0x1, 0x0, 0x0, 0x4050}, 0x8014) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000002000000000000000000000047f339003f1bf13d827bc0dfc600000100"/165], 0x98}}, 0x0) 00:16:57 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0xa0881, 0x0) write$P9_RMKNOD(r1, &(0x7f0000000100)={0x14, 0x13, 0x1, {0x2, 0x1, 0x6}}, 0x14) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:16:58 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000000c0)) r1 = syz_open_pts(r0, 0x0) r2 = dup3(r1, r0, 0x0) ppoll(&(0x7f0000000540)=[{r2}], 0x1, 0x0, 0x0, 0xfffffffffffffdbb) socket(0x1a, 0x3, 0x1000) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) ioctl$FICLONE(r0, 0x40049409, r0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) 00:16:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c72676f746d6f64653d30303030303030303030303030303030293034303030302c757365725f69643dbedec235c1e750194626bb8d1bb84bd598fa363f9ab122ade8667879fe101946c0e2f49d2b956bf34566611d647b3c66deda474653ca33a62b823d4b79fc99185677e0749758faa5cb4fe69ece599104d7dcc1245333496e8108b194375427e95a32782046a0d44ba765bfceb3ccb98f9a1ebf2ca25f7fdc080b761523f38825c7079129a211", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000480)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="20002c307c28fa33dc4001bd7000fcdbdf2501000000000000000c410000000c0014bdd4d0e04974cd85061806dc6aa999"], 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x48010) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$int_out(r1, 0x545c, &(0x7f00000003c0)) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fsetxattr$security_selinux(r1, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000440)='system_u:object_r:chkpwd_exec_t:s0\x00', 0x23, 0x2) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000040)=0x2) 00:16:58 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:16:58 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1f, &(0x7f00000001c0)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) 00:16:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:16:59 executing program 0: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@sco, &(0x7f0000000140)=0x80, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x1, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f00000001c0)=r1, 0x4) setsockopt$inet6_buf(r0, 0x29, 0x22, &(0x7f0000001240)="233bd12903471d8a4f7498f266a0", 0xe) read$FUSE(r1, &(0x7f0000000200), 0x1000) write$UHID_CREATE2(r1, &(0x7f0000001400)={0xb, 'syz0\x00', 'syz0\x00', 'syz0\x00', 0x66, 0x100000001, 0x2359, 0x58, 0x9ba, 0x0, "ff2dabf64d3bc55e7bd2a4879a62cc50e97d02315b8bb36e98bf28cbf0d743c594f3659b3ea03c4c08d3f4920e71975494f85c187ff009aa485175551ec1aa638d7e52c9aac980f42304414a088c6b1f918cc35041f2f939381a7c87a38b8c31354bea531fd9"}, 0x17e) fsetxattr$trusted_overlay_origin(r1, &(0x7f0000001580)='trusted.overlay.origin\x00', &(0x7f00000015c0)='y\x00', 0x2, 0x1) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030003130000000000000a0000000000000000000000000000000000ffff00000000524800000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b000000000500097d000000000000000000000000010000000900000000000000000000000000000000000fff00"/152], 0x98}}, 0x0) socket$key(0xf, 0x3, 0x2) sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f00000013c0)={&(0x7f0000001200), 0xc, &(0x7f0000001380)={&(0x7f0000001280)={0xe0, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x219a}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x254}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x162a}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xffff}]}, @IPVS_CMD_ATTR_DEST={0x70, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@empty}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffffffffff81}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@dev={0xfe, 0x80, [], 0x7}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xaf06}]}, 0xe0}}, 0x880) 00:16:59 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") getresuid(&(0x7f0000000140), &(0x7f0000000180)=0x0, &(0x7f00000001c0)) setfsuid(r1) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') pipe2$9p(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80800) write$P9_RSYMLINK(r3, &(0x7f0000000340)={0x14, 0x11, 0x1, {0x80, 0x0, 0x4}}, 0x14) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) fcntl$setsig(r2, 0xa, 0x14) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$P9_RWRITE(r4, &(0x7f00000002c0)={0xb, 0x77, 0x2, 0x6}, 0xb) [ 1004.361995] audit: type=1400 audit(1560471419.720:5719): avc: denied { create } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1004.396419] audit: type=1400 audit(1560471419.760:5720): avc: denied { create } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1004.398695] audit: type=1400 audit(1560471419.760:5721): avc: denied { write } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:00 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) [ 1004.458316] audit: type=1400 audit(1560471419.820:5722): avc: denied { associate } for pid=21877 comm="syz-executor.2" name="fuse" dev="devtmpfs" ino=4709 scontext=system_u:object_r:chkpwd_exec_t:s0 tcontext=system_u:object_r:device_t:s0 tclass=filesystem permissive=1 00:17:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:00 executing program 1: socket$key(0xf, 0x3, 0x2) [ 1005.017923] audit: type=1400 audit(1560471420.380:5723): avc: denied { read } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:00 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x8000, 0x8) write$P9_RLERROR(r1, &(0x7f0000000140)={0x14, 0x7, 0x3, {0xb, 'syzkaller1\x00'}}, 0x14) [ 1005.048041] audit: type=1400 audit(1560471420.410:5724): avc: denied { create } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1005.050353] audit: type=1400 audit(1560471420.410:5725): avc: denied { write } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1005.089301] audit: type=1400 audit(1560471420.450:5726): avc: denied { create } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:01 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) [ 1005.091574] audit: type=1400 audit(1560471420.450:5727): avc: denied { write } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:01 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x204041) ioctl$EVIOCSCLOCKID(r0, 0x400445a0, &(0x7f00000001c0)=0x10001) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000000040)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x40001}, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) ioctl$GIO_FONTX(r1, 0x4b6b, &(0x7f0000000140)=""/33) [ 1005.098614] audit: type=1400 audit(1560471420.460:5728): avc: denied { write } for pid=21877 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0x400000) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000001c0)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) 00:17:01 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000009f00000000000000000000000006000000000000000000000000360000000000c4268f4b000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:01 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:17:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") connect(r0, &(0x7f00000000c0)=@can, 0x80) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = fcntl$dupfd(r0, 0x406, r0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000580)={@empty, 0x0}, &(0x7f00000005c0)=0x14) sendto$packet(r1, &(0x7f0000000140)="26b6d1adda51d0a07fb09afa68d8a940359a11b69c3efc90958281267b57ae40463ef9a18af2f0a56b100fb7f616d71799ed46aa19322f17aa781016a14f50cdaae9ddfa60ef800cf1d5d63d144e47f46a7a536283393351e51eebd21fb79bc0b409ef9e15ec7f9446ebd92d15c73bca4b1c17a9f800e2037c87cb17f02f76c109ea1d1f9cb26636ab28e26ce4fc16c4fc0e482e3b3351d617bd7c3d22", 0x9d, 0x81, &(0x7f0000000600)={0x11, 0xfc, r2, 0x1, 0x9, 0x6, @dev={[], 0xe}}, 0x14) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:02 executing program 2: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000500)='/selinux/status\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x3) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0/file0\x00', 0xe, 0x1) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read(r2, &(0x7f0000000240)=""/142, 0x8e) r3 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000004c0)={r3, 0x0, 0x37, 0x6, &(0x7f00000003c0)="937f37492430036a2605bcfdc0af1bc2637843ee7149ed847356bfd5a7291b9680a1d0c65fd2ebbb5470207ac381d3c6bcb82d9a8ce3cd", &(0x7f0000000480)=""/6, 0x10001}, 0x28) read$FUSE(r2, &(0x7f0000003000), 0x7c) read$FUSE(r2, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r2, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r2, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:02 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000edffffff0005000900000000000a00000000f3000000000000000600000000000000000000000000000000000002000100000000000000060b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:02 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:02 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.redirect\x00', 0x0, 0xffffffaa, 0x3) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000140)={'veth0_to_bond\x00', {0x2, 0x4e23, @loopback}}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x400000000000003, 0xff, 0x3, 0x13, 0x0, 0xfffffffffffffffc, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:03 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:03 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/dev_snmp6\x00') r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x200, 0x0) read$FUSE(r1, &(0x7f0000003000), 0x1000) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r2, &(0x7f0000002000)="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", 0x1000, 0x4008004, &(0x7f00000000c0)={0xa, 0x4e21, 0x8, @local, 0x81}, 0x1c) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) ioctl$EVIOCGBITKEY(r0, 0x80404521, &(0x7f0000000240)=""/87) ioctl$sock_inet6_udp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000040)) 00:17:03 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$packet(0x11, 0x0, 0x300) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r2 = dup3(r0, r0, 0x7fffa) mkdirat(r2, &(0x7f0000000180)='./file0/file0\x00', 0xffffffffffffffff) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f00000002c0)) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000001c0)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e24, 0x2, @mcast1, 0x6}, 0x1c) getpid() fstat(r1, &(0x7f0000001400)) fstat(r1, &(0x7f0000001480)) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000001500)) fstat(r3, &(0x7f0000001540)) getgroups(0x2, &(0x7f00000015c0)=[0x0, 0xee00]) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000001600)) geteuid() getgroups(0x8, &(0x7f0000001640)=[0x0, 0xee00, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xee01, 0xffffffffffffffff]) getpid() geteuid() fstat(r0, &(0x7f0000002d80)) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000002e00), &(0x7f0000007e00)=0x120) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f00000000c0)={0x0, 0xfffffffffffffcc2, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000008001b0000000000da0f70928e550558"], 0x30}}, 0x0) geteuid() fstat(r2, &(0x7f0000002e80)) getpgrp(0x0) 00:17:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = add_key(&(0x7f0000000000)='blacklist\x00', &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000140)="e2ea263820c03cd56bc045943030d8ce3428c0ceb4b16fd44f21e8f74b6778885e3eb76f6c8ab06e217b627a6a8769207ded93f17514db600f4c48f6b213946671120785f8558c6feb36c6c18d7d026c327c7d5a6283dc0ec9e653fae3c6660dd4494338c9958fd0d3cd4227c42850bc88fb9d512b6af035f440dc15054be3b08eb2bfeefef1db28", 0x88, 0x0) r2 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$negate(0xd, r1, 0xbef, r2) 00:17:03 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:04 executing program 1: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000012c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000140)=0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000001340)='NET_DM\x00') sched_getscheduler(r1) r2 = socket$key(0xf, 0x3, 0x2) timer_create(0x7, &(0x7f0000001240)={0x0, 0x25, 0x5, @thr={&(0x7f0000000180)="d434e44366ec06d8701980044b5ebf56592ca4fb29891d3ea47f057a21bce8c157ab078f9c5950f6c661526a4d298056ea97b8497c91a27f43dbe899b19f9ae2e74f31574c1641a2b7f53226e67e5ed5bfe2b0e4ed3c0d0055ff8674fa792b7187b6a7cbab386c4a05b419a0051af0eb3094dbca9316183ff054b681c4d152832b59c1cb9a24a1e069014d07a5a05ea49e7bbe4c25aac2f079a2c0f9e98826e061eb8eaa2d8e263610e247d15880abf92ac1cc0ee7119bd8e8df4c8f7c8a212f2dd691d71002392c3d916ca48d9f1605bc3db0f1d98461ac090a7ccf38b4b8af3786de0e9edc7d12fa73f7b376a5011562f203d5be9ee1028d452d3a82db03966ed806f708203d7ca0fee45077038c692c07a89723ba7a33f14e3d8f79995d39dd8c4925fa2e6cb40f7e038932eba589511c63cc8523adca68f4cea4256c37f738b36fa05f01d4b9a79f2ab9acc8d87f30d6a59193dbc3d1a8e51a68a5a5fae7ad3134e35fcd51f7c339d3a5cb1df2110728d5c3ad1e1936489d4294c7871b7e83947dec7477e89dfa67356717b8473983bfd7c384bebd4eb4235ff63d45028bf845ca24b45f41738fb1c7d3c32b1af77c2e4c53bbf1bec17ce80cbd997d9b60e14f2bbd59a2ab4e0cd8714d3b9e3f10c0a6640fa3151eff18fc14c6ce4625646f626fad9b6c798c8a9eb5c05d12fcb7d3010219317cd3728a96116bad99870710fdaa9613e89fcd3efd650bf2d1d38bfd33ab20de83895fec316521e27b8fb4d4acbaab7dd50dbf081687e61a3b82bad332ae748c993a833569ff2a0190f02bec156cea62146fea3d0e64c8c55dc1e59bde1a0dd13f584c576fb8fc1388e8adb315190b7d9ab333ea28e966c664fb5414512d5e6d7d0cf576c8b4f462b4de4abd0fb8721dfd14e0989b0890bd47dd05153cdef97e17f62c79e301e606b29a2e88b41724dac6607443e74a46749b1ac26ea92ab760c26097721525c24cee9ca2ad23f9f88c283bc375968811d88a68cbf5bc1abfd371e29ca2c35a361f8d216b6a8171fe3344f587006604ba672cebc4e02eae95575e5df32f4b979e4983f25ea362ab30a757b3e354d1686aeb5893b1c9dd0c91a8afc188ad8a8ce295130000628f0abb2217afc7f058d5f3c1f8804cf2849d932fdf8117ca85e5bf9bd2ebb940b2414c5009ac34f62d1c76cf02a6531df0eb2b894317fd2f6a49e6a4c8f430bda1d6232d0ebbf84b3bc02fffa0f214b45cac3cc6f8cda48128b863ff249ed8e05d77278dda311c747952e6e0083d2f6620db3d95cbc77dd466402efdf43f16b885dc3dfb52d09ecca39cadafdf31cb052e46abff9d98095a5e4ff0eb6e83c8f3a38d8985b2b923d145bbf1df3f00a4ca82e7a616a55f8461b82a4f99f308eb5f72a98e36bb0edd04d82b72ee66c6a42b4245f6bdf192aaab605c42ff6ab8e409aa5263f499d2eca4f71e5aca647b6e8cefb6662166182fcb608f01e787b97401f49a653354fdcd601fd8c780d524c1a7c69eadd04116c8c3051fa43ae75cf0af61323900a96b0cb57f4642d2988abebb43cb72c9247c36cb0898ca0f560ab750c787fe13291155fa94753bb87753f16369c1b4a6b66ea82ab15da2ab8f54c6c16f072a12d4b7d5ba090fd29e82de710b8fd103c1c75d678573a35377d0332a45d30a3e5104b5048b392f058bbedadaf5d392ae7c539f270d849fb035978ce4e01e3ac345b2d0833243c41655e7c2971a2101fb0691a72fec853a1da5be89beb482f404a32b85f7206a48e79777f91e273d6c28a52ce888c005bf312489954e5942661fbc1e66d691f6a6d0dd1a2c268e3361b32554314402cab96a496606289286e7428f5d298ec65372678c4f52ae301bb46dd716f0a091ba55f854a2418e4319c5d1f2c6c8172ec8bf86d125ab3d1e5ef68a985d9d9b574c1e8fc6c4f62e21667372ca7c07d10833728422a207d3945d592faed4b1bfe086760b4fb878b5806e24e4cc567e5e00ffa51f9b2cdc464a5e03370993eb815ba0c9aaa5893c1e244ddb220d6efc5494a2e972551e24511a30fe93826902e46fd51fd4ce80ee987cccf6c0bd384ceb63ceb49f5027ac41418d5b00bb125752abeaa6c43af3bfa3f491498fd537ad1ba93e6c1a26e2edf0de8fc08acf6ba95a5e609945dcd68db2a3047b677a76cbb42b5db36e1156549a7d9fed66bd5427c034e1e6913f61e220c91bbde665de78028abdbb99a94a0bd0ab792cfee7eee18b47f0a30b5b953bb221daa9ea29e6f3f478bc2c445e1a476cd0880f82c2847074778b0bbff1890ab5e771c1eb236a4a429275a6e8f44133821dd7cd94d8e3acd23297355a0bdc1608c82ec28d83aca212deb94ef7e1737a1f7c1f1cf525e21f416420a3df06f71c8ba87d9803e1759fa001a1e39b423048f761efbfa54689a5c75c2d6cf8c960d57519a22f12bd93befc78e510d74c217152013d809d772be0769cc0705f2fa4ee6db148b86dd473e8125cbabc45461965cb32c6940b56339f338f4c91e4eb5a0c32c3e8cd128f847035938e662504b6b0838536b3f8bb1a9ed939cb0de9059d3b35b9b76333198ed75904f9f83b7802f8fc41cb17c4780d0e6487c5db60573308bf53a07ed0296de601f58fd83a8254b363f08d024f17116eb3fa37ee51cdf469a0af37a8cca0295b026a1d5ce8d91db098e94924e73f55af4d0c4ce0f04ffa6ac50804195cf102727326a4ffc1aa5e8a47237c9b99a3744c33cd34b1a2992202bd3941f00ebceefa4d0a24a77405b2353bea9e0730617e11f7ed1f31aa60385e695dd4628a224e5aadfbcfb18f9ad13369d273d1dde66e529f83eff15f90c4d7f2c126224cf4f58ae17541e00c8b0beb39ccb480c100c0f543b3256462cf823889190de9a279538733d578bfe7020fab2762c27c4f7b9169e00ab26234a5f24e2c4f7cf77030070501a7ed6b5d11b1df7cc214b81f4570e08343abbd332e38a5ed8e8a5aecfc2629b8a3f4df01434523e64e132a4d3cd2c744628fd5b410100657686cf57dc5e2c69910aea5ffa7228fe6409d9d6521c7e990e350af9b4abc3e7ab4a73089c6b857390ac8e68a3a5aca153f3502014bd38eb963c9b05a56e511ab21cd67c57f9668c5f0f97810bde08ed24649c3b3932c6271d915e398fe0f681cacab892b9babc0a36c940825eb94bb7b412a693b6dce218c453029bd6bb0dafc989400558988803158d2e6d2d30be45311dd1b482f1337ee011921e704a89793b664b76137a061f6e596c1a792177a9978d8b32f2b1e1be36041718947d784c4c992d439e33a8ee2c51a8aae5516454f6acf1a6e9b117da2c2184d9a02ff1f90c57b818d922d833d3d00f1044c9304d7b32295b11f9b59b80434d8cb5b5078e7cf1c25b9d2ac085bd3c8b4d96bc1938c8d1b64b09763bbff651e97ab9ce357489da3d0b6f3f920ee89dc8b279e43b87f46cb6ba896d51cdffee6293dbd43191eb5bd062c6e31d483493c0433af0a490139241c7ed6ed4a63fdde4b450426813e0aee1563ddee2fcc8e35febdb6afa75165d193c9804af8cdf04d84571f565ac4805a875b3ddf41473144f2d31bf5f8fe79342da4c9d6bc4e65097580f5d5c91e9402ebd83729614213a98e269939e48131bd9519e048984e15164021e0f181d76edb62d57e86cb16b312d00c5a7b4157389b6fbaa836d912d1b77a1b732c0906768d1c0e6326f3f3e4a224d9a6ed38eb44453d824d87703663a263c087841d1de59dc40e05a6ce2e31c41cdadb0778daa94c6ca14a3c8c120e35fc59ccb9eee208848b95b79d6563edd07ca95d7b5f1a5c55c21527d47c6499470fb9604430460aa0b767cec08dbfd3dee76c83e12a6832df0b42ff367636131ef01543b561b16d2ea2e2619d875b11a3ddf367940dc1dba854362bc67e131d3dd14979f4295bf8955a5981d7830395d6d8bfb1ea6b99fa835bd32ecc98a511e19f49b92ca01acbe0f9ad3b329bac47dd19326084a80f6757b67e049a9b3a57f6418d360155912dbbe830c5a0ec05e21d3c2cb59b6dc202d816d0a49f121146dccf3bbd3478daeb38f1f943296732e4b88a4d26587f1be392d64c229b15f50d058a28813d81ee50fca77423ae7d55cd2449f6d8011e96f699ccf02d208a2f70a24e64b260cc426d7e8650dbd91e522d99e4526f120959b222f327a6343f287c3a6b7ea97c0b2495dde25542ab12ba658a4b5b4d641ce469a052d602287892f4abaa43bdfbc9f9845899deef079149ffc7f85cd6d741eecdd2de3a461c9ced7aa94e79d6bfdcaa65ac5e48304cb508efa8656f8c32746f26643ef12f9eb682e9be149602ca09215700afca050250e2e116154e53022eda3fe85ed09a8596988a93221e59e2c2b2fe7cbb936d3366297056b3f83cdd53bb62c084687abe6edd5266745c821060ed1d8a3354b0e5e7435639b0eb31b533f10e19ddbbcf0077cd3b59387f22ef76141dcf6a0d7683dd289e9b2c236266bfb3ace61587bdbbfc936c0e462ae75ad98d71596e4b76f9373e4241aea8e0f4b704dedd382f86b5ebef09a7b4587f791880e6cf31574e992823cba013116ce168506ad25f30ddb3e2755dc84bd3df6b8201812eaf587dd157aa561186854a36d67246f1f9e41a7b19a07ffc20c516c5b94a73586795d7ab8089bef653abf535d9380028c1861cacb04e50fe62c6b3bd787e10decb0db2bc5e8a61d12b97772c323b016343ae017b396300d22b5804b4b49b08e1cabf6d22e1a73b67868ab266a39e5a53b3e65aeb468367419f2dec66394c50bd1a0640fec103b32a262646eea95a70795d6120488bf825f5826a18d2cffed108c618ed6bacbfaa558c9903caffdd6bd34e6ea711be351fdf296225b7f7ec6e9516da28aac0dfb1a83afcc5541cdb65872912ea890a7e1a117d6bdd58cea33dcfd67c59eee7d0a793f5dbb1ff94fc12bc1c53f2638f352955c9954fedd0b94c124782de5b09af99a7be23d4fe01789b4e1edc790801c74da57539e6177843f0cd41d5bd39ce4739644f90d7201e6c6c66800eca17d3fcc42974fc28015a6f16e37d04322e6716d99c5ab02bcfa2e21f63b5ce352b4e53360b15e9934026b7939a4232b593c5392af92e023045a3816ee61c10dc0a0f5b518ae15c498f11084ab99be3320ff4362ccdb02c5f60d560b08fae49a5f781abc2c8c029f14f0f015b20436264702b6d0f3a44d56c46ac0ee730d9619e83033753cd73e67bc67dfd5a2667bba20e3b2e8cd3d86540797259adf3fe9198968812452604bd0c26423a6698dcd9f8d1cd61b7cbfdae21114addbc1a8aa67cd0bb2329df1318ca2713b2cc7cca92d7d08c2dd055792bfc0ea17d9f629a053edbee75bde0d1a67dad8b72d2099995d5b0464308fc4d552d9d1b562029fcc88aa828d8efedbdcf09f0a0053b9ebdcea8f23b9e9dd73be1de9151c54176145ab814a4c4df246f3a1badd12411cebb339f8cd5a564bc91601f69b36da88c7e5daecf3345354abf44c7e98f17dad57cf4bc5c93cd51a436d79222c812300c40b890e35e44348e9364e9d8dfe63e7c9c60050381e27ded603856238a11649fce45de9dd32b3f3a93488a21e2b4f0b2f046847f2b3f9ed957264d1e64d7510d0dc1a7e992a36f2c00c4cb79c6c316c7f93e905a9a3b3d6c4c4babb681b3b3c3fafc2284caf2563a351581f00f1ce68332781129906679b67816e2ca057f861aeb71a49605ab0dfab79fe3f3fb0f12b63dc2b0feba9f1ef8dc97fb9a89f0fafc1c841ee02f615585672baefc4058", &(0x7f0000001180)="55b67279d06be4c86ece9dedb2c258f2af32372864f4676d8aceae4a9ed889f9f3b6c1c43e6b9d4743381d266c7230aa343ba153224ad9f5777797aca43aea613c967d176caa84da9664e656fc7d5be3470b905957f7c6a05ed9ed92def6ae1172e7f7fa37e08e3fbe338bbafe49f44ad18b5456b7ee93d6f3797ddb1eaba7d184d8a3d7fd256e3cc38d2ea3509b0cc2cc5093db7dc98036a1b55f27ae90ecf13fd09b1fbe70"}}, &(0x7f0000001280)=0x0) timer_gettime(r3, &(0x7f0000001380)) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000000)) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff000000000000000000000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff02000000000000000000000000000100"/152], 0x98}}, 0x0) [ 1008.979103] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 00:17:04 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = getuid() mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@blksize={'blksize', 0x3d, 0x1000}}, {@max_read={'max_read', 0x3d, 0x1000}}, {@allow_other='allow_other'}], [{@appraise='appraise'}, {@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'vboxnet0'}}, {@uid_gt={'uid>', r1}}, {@fsname={'fsname', 0x3d, 'user_id'}}]}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 1009.260406] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. 00:17:04 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) ioctl$TIOCSTI(r0, 0x5412, 0x2) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r2, 0x2, &(0x7f0000000300)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1, r1, &(0x7f0000000140)="ea33ef7c0602fd64646f9b48fe3469808dab73f30680df6d578d1a5eb29d3fee5f52dfd963866792b2b4e3192ce345313e85832815e1ec95", 0x38, 0x0, 0x0, 0x1, r0}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x1fd, r1, &(0x7f00000001c0)="b7f66a7e2d0a13eec7fbf21f65e520df1c57816d8b7d5fd312465b61cebd1df6951430f30b4cd7e8d1f4a4e067f932e77b81a63b0906f6006a3f99303e4d2642ce29d7244f546808a9584d16098a3aa163917f96b85df228093a08316edfc3681c928b479afb2ad3abf6802a5367bf56f38bb92a", 0x74, 0x100, 0x0, 0x2, r0}]) llistxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 00:17:04 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) [ 1009.462343] audit_printk_skb: 9 callbacks suppressed [ 1009.462357] audit: type=1400 audit(1560471424.820:5732): avc: denied { create } for pid=22002 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:04 executing program 0: r0 = openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) finit_module(r0, &(0x7f0000000040)=',$&\x00', 0x1) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:05 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 1009.733687] audit: type=1400 audit(1560471425.090:5733): avc: denied { write } for pid=22002 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:05 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) 00:17:05 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x0, 0x0, 0x0, 0x3}}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:05 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 1010.284224] audit: type=1400 audit(1560471425.640:5734): avc: denied { read } for pid=22002 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1010.328570] audit: type=1400 audit(1560471425.690:5735): avc: denied { module_load } for pid=22019 comm="syz-executor.0" path="/selinux/user" dev="selinuxfs" ino=9 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:security_t:s0 tclass=system permissive=1 00:17:05 executing program 0: clone(0x20000000, &(0x7f0000000140)="faaf4922f4e89f6291b946b12e18c5f194d63768b21d4834683060ad637706e5687cd118dd976298efe04f02f112c3f8469f02cecf73654e3771567c1d3cdab28ba5e9bbbba5ae15007b2e41e7750c30b9555035d8eb2cfd622f354509037b4ee4237f7b42a784f992fc67b1328253ac043d69852a7daf6019f2e08f0df456f21ef85bcf93a0be322b313be0df86a565ce63794e55fbc565a60704d2647cf953de8924a3c2a4970f978e44dcd149bd6afe1ad9f682e064", &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000200)="6a7f62f5e86a17e15dc025f042853e3d3a0d770feda4f9b21358b503631a2f167e68") r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:06 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xe, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x70}}, 0x0) [ 1010.338464] audit: type=1400 audit(1560471425.700:5736): avc: denied { create } for pid=22002 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1010.340798] audit: type=1400 audit(1560471425.700:5737): avc: denied { write } for pid=22002 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:06 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r1, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=0x7, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x9, 0x1}, 0x0, 0x0, &(0x7f0000000240)={0x0, 0xe, 0x2, 0x3}, &(0x7f0000000280)=0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=0x60}}, 0x10) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f00000003c0)) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:06 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x2}, 0x10}}, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) openat$ashmem(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ashmem\x00', 0x8003, 0x0) 00:17:06 executing program 5: open(&(0x7f0000000840)='./file0\x00', 0x2, 0x52) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000880)='/selinux/policy\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0/file0\x00', 0x8000, 0x1) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000680)={&(0x7f0000000700)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="f5df324b00000000df25001462726f6164636173742d6c696e6b0000d609728b264e0e6f221bbfa653a388d4b990a94305733c37120e80acb0"], 0x30}}, 0x11) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000980)=@get={0x1, &(0x7f00000008c0)=""/176, 0x1}) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000180)='/dev/uinput\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='/dev/uinput\x00', &(0x7f00000002c0)='selinux#\x00', &(0x7f0000000300)='trusted.overlay.redirect\x00', &(0x7f0000000340)='mime_typeem1posix_acl_accesssystemkeyring$wlan0\x00', &(0x7f0000000380)='trusted.overlay.redirect\x00', &(0x7f00000003c0)='vboxnet1\x00'], &(0x7f0000000580)=[&(0x7f0000000440)='/dev/uinput\x00', &(0x7f0000000480)='$eth0\x00', &(0x7f00000004c0)='trusted.overlay.redirect\x00', &(0x7f0000000500)='trusted.overlay.redirect\x00', &(0x7f0000000540)='/dev/uinput\x00'], 0x1000) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) rt_sigreturn() llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000740)='nbd\x00') sendmsg$NBD_CMD_STATUS(r1, &(0x7f0000000800)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x30000000}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x38, r3, 0x100, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x5}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x300000}]}, 0x38}, 0x1, 0x0, 0x0, 0x24000001}, 0x20000000) 00:17:06 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:06 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:06 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 1011.699130] audit: type=1400 audit(1560471427.060:5738): avc: denied { create } for pid=22054 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:07 executing program 1: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) 00:17:07 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000180)=@md5={0x1, "b0fb66c643e098bf2a9c3e2450e6a47e"}, 0x11, 0x1) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000003000), 0x7c) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:07 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:07 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") get_thread_area(&(0x7f00000000c0)={0xffffffff, 0x0, 0x4000, 0x0, 0x800, 0x3, 0x80000001, 0x0, 0x4, 0x8}) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) 00:17:07 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000240)={@remote, 0x48, r1}) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:07 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, 0x0, 0x0) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:07 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000040)=0x30) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000800000003, 0x0, 0x3, 0x20000000000001a3}, 0x10}}, 0x0) 00:17:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x0, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e20, @loopback}, {0x306, @random="ef6ba9bb7d28"}, 0x8, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x26}}, 'netdevsim0\x00'}) 00:17:08 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000000)={'icmp6\x00'}, &(0x7f0000000180)=0xffffff91) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='\x00\x00\x00', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',groupEid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:08 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = dup2(r0, r0) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000000)=0x2, 0x4) 00:17:08 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000140)={0xe, 0x7, 0x1, 0x3, 0x8c, "b283449569f76b8d09d2246e0c679afd6b779391227b17eb0419c3d9095e0c0f833c58f3c35e31b5565c6807cd438c7a1d66c1e38cc3b7cef304d00d3dc0b26bf96ee2172157b0683c4478c34e2714a7d33f9f9f508571c8678e7dfb6c0957fd2ca51f7ff32dc8493aefc8055ff27f1998d0f35416dfcfcc4b556c29819c84ea374f784d0250091d571cc580"}, 0x98) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff02000000000000000000000000000100000000000000000b333004c4e2784462"], 0x98}}, 0x0) 00:17:08 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setreuid(0x0, 0xee00) r1 = geteuid() setreuid(0x0, 0x0) mknod(&(0x7f00000005c0)='./bus\x00', 0x8, 0x0) lsetxattr$security_capability(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000000c0)=@v2, 0x14, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="11dc86055e0bceec7be070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setresuid(r1, r1, 0x0) execve(&(0x7f00000001c0)='./bus\x00', 0x0, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:08 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'bpq0\x00', 0x1402}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000030000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x40004) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x80, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c, r2, 0x400, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x4}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x3c}, 0x1, 0x0, 0x0, 0x840}, 0x40004) 00:17:09 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) removexattr(&(0x7f0000000080)='./file0\x00', &(0x7f0000004000)=ANY=[@ANYPTR=&(0x7f00000003c0)=ANY=[]]) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) ioctl$LOOP_CLR_FD(r1, 0x4c01) 00:17:09 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="020300031300e884a7a97c778baa6fd5d06ce0e2bb3f0000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff02000000000000000000000000837d00010000000000000000"], 0x98}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x90) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000200)={0x1, 0x0, 0xcc, &(0x7f0000000040)="5c61afe205134a63e817fa00c4624218f0df7c2a3fb997a5fe6104c65b6214af13ae65338215e823a41dae5cf26f7d5bc2bbb1c24a14d411e420fa890216adfc4f37505c742eb556922dad62b4f99389dc92697ae1c0a35048f7ebb1d00240a96c8af4695027d6c0dd3f08fe46e0962352b1ec8f616b9dd78c0a8f853e507975c6a87f7d461d3c93155619b6f281d6b631949c641f43e588587a42a3b8d49f7c0192cefd30407b8873bbb197bc1709c16e1d757702583899b8171c31bd7c8ebd45afcc7ff528210224e10417"}) 00:17:09 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 1013.890638] audit: type=1400 audit(1560471429.250:5739): avc: denied { create } for pid=22105 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1014.061303] audit: type=1400 audit(1560471429.420:5740): avc: denied { write } for pid=22105 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:09 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup3(r0, r0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000140)=@v2={0x2000000, [{0x3, 0x8}, {0x2f, 0x1}]}, 0x14, 0x1) write$apparmor_exec(r1, &(0x7f0000000180)={'stack ', '^prmceth0GPL+cgroup-secu\xff\x01\x00\x00/\x00'}, 0x24) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000040)={@remote}, &(0x7f00000001c0)=0x14) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002151100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:09 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = add_key(&(0x7f0000000380)='id_\xc6\xd4\xd2\xffZ\xa0}2\x9b/\x15\xfe\xd6l\x0e\xeaxxb\xcaci\x96\xdf\xf0X\x02\xc0\xacC\xa3\x11\xf4\xf6\x9e\xfc\x8c\xac|\x104r\xb5\x95\xc4\xef\xf6U\xda\x9dr\x92|\x06\x02=\xe7@\x90\x83e\x83\xa1\xdb\xf0\xd7/\xb7\xd8\x04\x7fF\x92\xdd]\xdf\xa5\x9f\t\xcb(\xc8\xe5\x13N\xdcvO\xcf\xfc\x99-C\xbf\xd8o\x04.:B^\\\x00Q\x0e0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1c, &(0x7f0000000040)={@ipv4={[], [], @dev}, 0x0}, &(0x7f0000000140)=0x14) sendto$inet(r1, &(0x7f0000000240)="bad504ee12e369b5055b6ad5c6130667a704003964b6f0839a4ed59d6764e96598c309312cbb56a81946e337f9c90179928079c0a55931c8acf129a0a3ad63eb909b16e88a59aaea135cf4d0088778d3868041e95e59fbfe62d70847116f8926f388ff71d02315e15d6d65a5ad5fc22ea1bb480c97b4d198aa4a4c5976a4bdb0782ffc0a63cce7972472aaff694036a8d1bebef308fbb677b84d8a7d097248a2249b78dd375c3314bbd0aaba90260ad82471861c030439aac0d3bb343457ee736338e68ed284b2c2605a5d5288932f92426459a8dccef3f2392a4ac6d82a6ba23f44c8aef243b860e4adeb47d0", 0xed, 0x5, &(0x7f0000000180)={0x2, 0x4e24, @multicast1}, 0x10) syz_extract_tcp_res(&(0x7f0000000080), 0x99, 0x9) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000200)={@rand_addr="94fceb333b5f59c71fd7bcf146bb93ab", r3}, 0x14) r4 = getpgid(0x0) ptrace$cont(0xffffffffffffffff, r4, 0xf4, 0x5) sendmsg$key(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)={0x2, 0x400000000000003, 0x0, 0x3, 0x2000000000000365, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_ident={0x0, 0xb, 0xe3d, 0x0, 0x3}, @sadb_x_policy={0x8, 0x12, 0x1, 0x5, 0x0, 0x0, 0x8, {0x6, 0x3b, 0xffffffffffffffff, 0x60, 0x0, 0x6, 0x0, @in6=@dev={0xfe, 0x80, [], 0x10}, @in6=@loopback}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0xc8}}, 0xfffffffffffffffc) tee(r0, r0, 0x8000, 0x0) 00:17:10 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f00000000c0)={'nat\x00'}, &(0x7f0000000140)=0x54) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:11 executing program 0: r0 = socket(0x1, 0x2, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000000c0)) shutdown(r0, 0x0) ppoll(&(0x7f0000000000)=[{r1, 0x1}], 0x1, 0x0, 0x0, 0x0) shutdown(r0, 0x1) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000007300000000000000000000ffff0000e8ffffffffffffff000015000900000000000600000000000000000000000000000000000002006d79818f00000000020b0000000005000500000000000a00000000000000ff020000f0ffff03716807000000000100000000000000004fe5d3e2bec9374e6b5741807ef3a36a2113fa753c5313627ff59d4989bc4467ba84b7edd44fa280dd91387880d6119fd442c6567c96b053440e7b221dedb1e2c74ed25858e29e7cd28542e510031945131da68f76c33231a799563ca01df8815800b515ec5618267d077b00a1a5ad48bdc7e1f50eacf3108072f6e254d33e761ecbc7d396716bc5b54b85091075e51591455a76ba3b9f71c97fcb5349373fc5ce3a0af783b300"/316], 0x98}}, 0x0) 00:17:11 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000040)={0x0, 0xfb, 0x1c, 0x1, 0x7, "2407df3131d07f4eaea8ccce05276a77", "1543a4210e44a9"}, 0x1c, 0x3) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:11 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") perf_event_open(&(0x7f0000000040)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000180)=""/137, 0x89) 00:17:11 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = getpgid(0xffffffffffffffff) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000040)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a004000000000000000000000060000000000000000000000000000000000000200010000000000000005000500000000000a00000000000000ff0200020000000000000000000000010000000000000000cfc1548c5b3b30e343e8cccc65da725397ac0fa84f922ad7cc7c91e94da5c9a9f8a6ae3b176aee8d23ddd2e812aaaf630600b50af216934ae4acb38416a11547d76045dc182e4cb9580206b81fe5ff4ed9efaac4a03ea57edb86445fa59e88a2ae89c75b5e88396b4167e81f209850849afb"], 0x104}}, 0x4010) fcntl$setpipe(r0, 0x407, 0x9) 00:17:11 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_flowlabel\x00') bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f00000000c0)='./file0\x00', r1}, 0x10) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:12 executing program 4: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) write$input_event(r0, &(0x7f00000002c0)={{0x77359400}, 0x3, 0x7, 0x9}, 0x18) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x8000, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000140)={'bcsf0\x00', 0x100}) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x40, 0x1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000240)={&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000180)="a906af3b6686778b522bfc4f7e0fa62a1c836fd9e1664b61b2ac2c0495663057dab07938c4eb689f1f6f177a4d1a9af048f146b45985a11baaae0fa97782cee9357ed0078986cd4a0b26a8427ab3abd7e4d00756e96bbcbe2552dd4a9df516a948e651040a9a0c31a0465190a6de7305195a7c5bdae3d9e8eb68a05a334ec7f8e7be7ac18e5288648dc31f1fdba716bb003d5cfadf245d22b4ef170d70a991b6a2f11779f83564384230b990207424c5d6fd4723ac226f4fdec5f17d46", 0xbd, r1}, 0x68) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r1, 0x400454cc, r2) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = dup2(r1, r1) write$P9_RLERRORu(r0, &(0x7f0000000080)={0x1f, 0x7, 0x2, {{0x12, '.securityeth0[ppp1'}, 0xb820}}, 0x1f) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f0000000000)={0x1, 0x1, {0x27, 0x36, 0x16, 0xc, 0x5, 0x95d, 0x3, 0x40}}) r3 = add_key(&(0x7f0000000240)='big_key\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f00000002c0)="cda33112477564ac5df6e923585516b623e09c80759acf95d4ec81e31eee109c08e65f8d587cc1bce1adb44746ad9af0f0fc17b8fdaef354d1a794922560894feb1f4aa36ea06b6711be884edc225da333f00b92f3fb1055d1fca78ffe496007c6e9745a05c2cf1350d8c5876d9f7579327ceed66d4d0adec0546886cb9cdaa46bda4479a7cd1e8a2c59a2e13b1d41dfee6b80e717df17b32be3", 0x9a, 0x0) request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000200)='.securityeth0[ppp1', r3) accept(r0, &(0x7f00000000c0)=@ll, &(0x7f0000000140)=0x80) socket$key(0xf, 0x3, 0x2) 00:17:12 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:12 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) flock(r1, 0x2) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000540)={0xb0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0f630c40020000000000000000000000076304400300000001634040020000000000000000000000000000000000000010000000000000000000000070000000000000001800000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="852a747001000000", @ANYPTR=&(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/113], @ANYBLOB="710000000000000000000000000000001900000000000000852a747001000000", @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00'/135], @ANYBLOB="8700000000000000010000000000000013000000000000008561646600000000090000000000000002000000000000002900000000000000"], @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="0000000000000000280000000000000050000000000000fd"], @ANYBLOB="1063084000000000000000000b63000000634040010000000000000000000000000000000000000011000000000000000000000050000000000000001800000000000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="852a646600000000", @ANYRES32=r0, @ANYBLOB="000000000000000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="0000000000000000000000008561646600000000000000000000000001000000000000003a00000000000000"], @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="000000000000000018000000000000003000000000000000"]], 0xd6, 0x0, &(0x7f0000000440)="0b7901c10a9ac6b72606f7b5f9752895176a6a7ec2fa29cb8ccb9409490c26769c3f0e94fb896b29cd5937bc2cde6ad80dab7050b6ced8989cdc34532c64a522ea5c249cbcbb34d8cf1d81a7a7e2c81bc46b3a206d56ff83a715e212f57bd13e6bb5298418fa831fa01b28abdaa694c3ed83c381b99cc9ca58e82007de56591c700ef643e46b5b62b28c2a4c680d4776536483ab44491c19e244427491949e76c2989699a3ec19af369697861f0cd99cca2f2e82aa062d1557409daed187f7072a6e90221360a4360c982edebd91d0fc27f105037dbf"}) bind(r0, &(0x7f0000000580)=@nfc={0x27, 0x1, 0x2, 0x7}, 0x80) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r2 = request_key(&(0x7f00000007c0)='syzkaller\x00', &(0x7f0000000800)={'syz', 0x2}, &(0x7f0000000840)='syz', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000740)='keyring\x00', &(0x7f0000000780)={'syz', 0x3}, 0x0, 0x0, r2) lstat(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = add_key$keyring(&(0x7f00000006c0)='keyring\x00', &(0x7f0000000700)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$get_persistent(0x16, r3, r4) 00:17:12 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuacct.usage_sys\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0/file0\x00', 0x8) lsetxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0/file0\x00', 0xe, 0x1) [ 1017.414290] audit: type=1400 audit(1560471432.770:5743): avc: denied { create } for pid=22193 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:12 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = accept4(r0, &(0x7f0000000040)=@generic, &(0x7f00000000c0)=0x80, 0x80000) getsockname$netlink(r1, &(0x7f0000000100), &(0x7f0000000200)=0xc) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000000)={0x8, 0x0, 0x8, 0x6, 0x12b5600000, 0x3}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a08996b36bef19c6dd6380000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a0000a7a8699dffff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) [ 1017.654337] audit: type=1400 audit(1560471433.010:5744): avc: denied { create } for pid=22193 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:13 executing program 0: sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000700)=ANY=[@ANYBLOB="020300031e0000000000000000000000020013000000000029bd70000235000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b000000001300090078040000bad753dd5b2551d1d9e4a41d61cd6a740b2a621071b3e4af14217e334d5621ff5dc2ad6120422784d92139664d77b3647363889a199e47abaff93ada8f8900e3656c0873a63d35e99fa25fa2536aad2931388f5d12cfd8f9f2fa3ee2f78c599333f6c8b95cc6c6db002a92a141a67f50e06f7084c4f3537b757021477c231547c394fa825b038fb188deb4821fe33200"], 0xf0}}, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x82) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={r0, 0xe3, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=0xb12, 0x0, 0x0, 0x0, &(0x7f0000000180)={0x807, 0x4}, 0x0, 0x0, &(0x7f00000005c0)={0x4, 0x7, 0xff, 0x3f}, &(0x7f0000000400)=0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x10001}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000003c0)={r0, 0x10, &(0x7f0000000380)={&(0x7f0000000040)=""/28, 0x1c, r1}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r0, 0xc0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=0x4, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x3}, 0x0, 0x0, &(0x7f0000000280)={0x2, 0xc, 0x69, 0x6}, &(0x7f00000002c0)=0x1f, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=0xfffffffffffffffb}}, 0x10) 00:17:13 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) pipe2(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000400)='nbd\x00') r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x14001, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000540)='net/l2cap\x00') socketpair(0xa, 0x6, 0x2, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$full(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/full\x00', 0x428081, 0x0) r7 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000600)='/dev/vga_arbiter\x00', 0x622182, 0x0) r8 = open(&(0x7f0000000640)='./file0\x00', 0x10000, 0xa) r9 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$NBD_CMD_DISCONNECT(r1, &(0x7f0000000780)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000740)={&(0x7f00000006c0)={0x5c, r2, 0x20, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_SOCKETS={0x3c, 0x7, [{0x8, 0x1, r3}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r6}, {0x8, 0x1, r7}, {0x8, 0x1, r8}, {0x8, 0x1, r9}]}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x70}]}, 0x5c}, 0x1, 0x0, 0x0, 0x5}, 0x10) 00:17:13 executing program 2: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0xc0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1, 0x1}, 0x0, 0x0, &(0x7f0000000100)={0x3, 0x3, 0x2, 0x1}, &(0x7f00000001c0)=0xffffffffffffffeb, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x5}}, 0x10) r1 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480)=r0, 0xfffffffffffffe89) r2 = perf_event_open$cgroup(&(0x7f0000000400)={0x7, 0x70, 0xf9ad, 0x0, 0x4, 0x9, 0x0, 0x4, 0x40200, 0x2, 0xfffffffffffffffe, 0x1ff, 0xffffffffffffffc1, 0xfffffffffffffffe, 0x10000, 0x3f, 0xfffffffffffffff8, 0xe52, 0x2, 0x3ef9, 0x1, 0x0, 0x100000000, 0x9, 0xfffffffffffff70a, 0x31, 0x100000001, 0x4, 0x0, 0x7, 0x100, 0x1, 0x8, 0xd000000000000000, 0x0, 0x3, 0x8, 0x1, 0x0, 0xf8, 0x4, @perf_bp={&(0x7f00000003c0), 0x1}, 0x4000, 0x10000, 0x7, 0x5, 0x0, 0xec9, 0x8}, 0xffffffffffffff9c, 0x4, 0xffffffffffffff9c, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/route\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000600)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x68, 0x0, 0x220, 0x70bd2c, 0x25dfdbfc, {{}, 0x0, 0x4107, 0x0, {0x4c, 0x18, {0x8, @link='syz1\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x80) r4 = socket$inet(0x10, 0x2000000003, 0x0) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000140)="240000002e0007031dfffd946fa2830020200a0009000000001d85680c1ba3a20400ff7e280000005e00ffffba16a0aa1c0009b3ebea8653b1cc7e63975c0ac47b6268e3966cf055d90f15a3", 0x4c}], 0x1}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'v\x00\x00\x9eo\x00\x00\xfc5\x95\x0fKg/L\x86', 0x800000d801}) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') recvmmsg(r4, &(0x7f00000064c0), 0x40000000000022a, 0x2, 0x0) 00:17:13 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000001400)='./file0\x00', 0x40) add_key(&(0x7f0000000080)='ceph\x00', &(0x7f0000000100)={'syz', 0x1}, 0x0, 0x0, r1) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write$UHID_CREATE(r3, &(0x7f00000012c0)={0x0, 'syz0\x00', 'syz1\x00', 'syz1\x00', &(0x7f00000002c0)=""/4096, 0x1000, 0x80000000, 0x4, 0x5, 0x100000000}, 0x120) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x17f) 00:17:13 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300031300000000000000ffdbdf2505000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a000000000000000000000000060000000000000000000000000000000000000200014ce4a3fc35c41d3a0b0000000005000500000000000a00000000000000ff02fcffffff000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:13 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:13 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$VT_RELDISP(r1, 0x5605) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000001c0)={{{@in6=@remote, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000080)) bind(r1, &(0x7f00000000c0)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha512\x00'}, 0x80) r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x624, 0x100082) r5 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) fsetxattr$security_smack_entry(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) r6 = dup(r5) write$evdev(r6, &(0x7f0000000240)=[{{0x77359400}, 0x0, 0x70dd, 0x4}, {{}, 0x0, 0x0, 0x92f}], 0x30) sendfile(r4, r5, 0x0, 0x20000102000007) sendfile(r5, r3, 0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, 0x0, &(0x7f00000005c0)) lseek(0xffffffffffffffff, 0x0, 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000140)=0x9) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xa, 0x0, &(0x7f0000000000), &(0x7f0000000040)='GPL\x00', 0xc2, 0xfe, &(0x7f0000000140)=""/96, 0x41000, 0x2, [], r2, 0xc, r0, 0x8, &(0x7f0000000000)={0xa, 0x4000000000000002}, 0xfffffffffffffeda, 0x10, &(0x7f0000000340)={0x2, 0x2, 0xd65, 0xd0}, 0x10}, 0xffffffffffffff9f) [ 1018.630975] audit: type=1400 audit(1560471433.990:5745): avc: denied { create } for pid=22219 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:14 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x83, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x80a00, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000100)=""/135) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 1018.727549] audit: type=1400 audit(1560471434.080:5746): avc: denied { create } for pid=22223 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1018.735603] audit: type=1400 audit(1560471434.090:5747): avc: denied { write } for pid=22223 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1019.241926] audit: type=1400 audit(1560471434.600:5748): avc: denied { write } for pid=22219 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:14 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x410000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)={0x10c, r2, 0x700, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1000}, @IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@local}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x10001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x34b}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffffff7}, @IPVS_CMD_ATTR_DAEMON={0x5c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x4}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4={[], [], @local}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}]}, 0x10c}, 0x1, 0x0, 0x0, 0x48000}, 0x4) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 1019.271339] audit: type=1400 audit(1560471434.630:5749): avc: denied { read } for pid=22223 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1019.551978] audit: type=1400 audit(1560471434.910:5750): avc: denied { create } for pid=22223 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:15 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) prctl$PR_SET_FPEMU(0xa, 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="020300071300000000f0ff000000000005000600000000000a0000000000000000060000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff020000000000000002000000000001000000000000000004720e9b5614eda32649aad0fbf6a21218e4bf599d5898600744f11b505c7325dccc4cbeb14cd1e59526559c4e188177e5e8ccb5ede76c92730fe727a5ad7ff96c1f490473dcc3b1db57148b2238395674fcadfdd841f8b2400d08c0065c3d8605caab7e0e53e8f9074729e3e81852ada1f742f258c5d3c73becf97c30769d60363db644378e9275622f2b31213a522cd9c3a226c7633a480f82200fbb4d55fb2a300debb09dfd57cb6c7665f45893b09192c3555c5021af681f6d7a3a622d3ce1d1deba66101f6898e98f2b6a32d24d95910b49411a9a5cf756742d6c84090000000000000000ab9b5bdc6e51fe7b0001eef7af5ddcc9b71b9e6000e47951e1ee0588ac477fb7b21c8e0798e7871910885dc5ed11c9f5a753129e0c2fe429174c8d94118320a55e26173f955ea3f9943b2cf7b6adbdc21a8e27b2385d2b1df2ddd4c28589aed4c77aacffd32fdd8aff08d9430f7c3a7bb4013ad6fe04a968e74842ffe1512be446f3a10e33d7284f3afb88b0cf5c0223c474b09b578a9b295fd8445f5c063b0fc6395833f991e49600"/562], 0x98}}, 0x0) 00:17:15 executing program 0: r0 = socket(0x3, 0x80a, 0xffffffffffffffc1) setsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000000)="7b507f07bb576ec48ce7a51aeb44d2670e4ed9ad070c5016d079a4cf1cda4257942cbadb97a8e7d6dbaea9f915e2b6d6349544a542f81a6286e0d1da1dd8a6cea1ffc4b657fb0bf17be37f3182f7caa02ec9e23a1a138cd944f3e3952531b7be63a76fc4c466882ea39dbc372b5eac786fc67f5404a07aa7a4d6e921b11011e6db4da1d66a5732e87d45491ce81bdf922d125cb5c73faa84b22a1cc3ad97665cd86efa55d050e3c483ecaec7", 0xac) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0x2, 0x0, 0x3, 0x13, 0x0, 0x0, 0x25dfdbfc, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:15 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getegid() [ 1019.666212] audit_printk_skb: 3 callbacks suppressed [ 1019.666227] audit: type=1400 audit(1560471435.030:5752): avc: denied { create } for pid=22219 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1019.668573] audit: type=1400 audit(1560471435.030:5753): avc: denied { write } for pid=22219 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:15 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 1020.282787] audit: type=1400 audit(1560471435.640:5754): avc: denied { create } for pid=22264 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1020.287216] audit: type=1400 audit(1560471435.650:5755): avc: denied { write } for pid=22264 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:16 executing program 2: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x0) creat(&(0x7f00000000c0)='./file0/file0\x00', 0xc1af30122293a339) syz_mount_image$f2fs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:17:16 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dcc8050bcfec7be070") openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x1, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 1020.803186] audit: type=1400 audit(1560471436.160:5756): avc: denied { read } for pid=22264 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:16 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005020600000000000a0000000000000000000000000000000000ffbcdd7e95dac078b3000000000005000900000000000a00000000000000000000000000000000000002000114000000000000020b0000000005000500000000000a00000000000000ff02000000000000000000000000000100"/152], 0x98}}, 0x0) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x40, 0x0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000040)={'icmp6\x00'}, &(0x7f0000000140)=0x1e) [ 1021.150271] audit: type=1400 audit(1560471436.510:5757): avc: denied { create } for pid=22264 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:16 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) 00:17:16 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x400000, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U+', 0x8}, 0x28, 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x3, 0x14, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_x_nat_t_type={0x1, 0x14, 0x7f}, @sadb_key={0x7, 0x9, 0x160, 0x0, "12035e4f5ade7fe9aee8e72314df18121342c73227ac2233bfc6fc272ae4c2f64bc61b8237bb478fdfb1d075"}]}, 0xa0}}, 0x0) 00:17:17 executing program 5: llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)=""/169, 0xa9) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$zero(0xffffffffffffff9c, &(0x7f0000000540)='/dev/zero\x00', 0x800, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000440)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="58010000230020002abd7000fddbdf250000000014000d00ff010000000000000000000000000001300101007368613235362d617678000000000000000000000000000000005400000000000000000000000000000000000000000000000000000000000000000000000000380700006bdb103e7de83a247dc3c54d2f7fde5d1f9d446cbba66a5c695ac5310fcaf702649095cc3bfe6f4c36662786e2fab6fc4532e80d1df886861ae8edf1d9cf432109eec89085eab6dde7cafac4bde9baa13449de2c289753c576eafa9990cd5d90b2d7c795d9b2ba44319d5360a6ce7b7a668f65e568540122b61a91bc0f46a6dc8b5a33de421ce79ad90c09d75a0a88fa20bb6059b53f2c6bb5656e95f9f55391005aa1b7000e3662e40164297cd00ac38f9224ed61e04130ec3c845d1ce4aeaff22b40febb48425bd8ad89b79c0983e2e00cc93e22c46f5a84e7298105495c04556c340f00e39700"], 0x158}, 0x1, 0x0, 0x0, 0x4}, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:17 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0}, &(0x7f0000000380)=0xc) getresgid(&(0x7f00000003c0), &(0x7f0000000400)=0x0, &(0x7f0000000440)) write$P9_RGETATTR(r2, &(0x7f0000000480)={0xa0, 0x19, 0x1, {0x2000, {0x80, 0x0, 0x2}, 0x140, r3, r4, 0x955, 0x4, 0x2, 0x80000001, 0x8, 0x0, 0x1, 0x8, 0x2, 0x21, 0x7, 0x4, 0x79d5, 0x2, 0x3bf7}}, 0xa0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@initdev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000040)=0xe8) r6 = getegid() write$FUSE_CREATE_OPEN(r2, &(0x7f0000000240)={0xa0, 0x0, 0x6, {{0x6, 0x2, 0xbf0, 0x0, 0x7, 0x5, {0x4, 0x9, 0xfffffffffffff800, 0xfffffffffffffffd, 0x3, 0xffff, 0x5, 0x7fffffff, 0x6, 0x3f, 0x2, r5, r6, 0x5f, 0x3}}, {0x0, 0x5}}}, 0xa0) write$P9_RWALK(r1, &(0x7f0000000300)={0x30, 0x6f, 0x1, {0x3, [{0x2, 0x3}, {0x8f, 0x3, 0x4}, {0x20, 0x3, 0x6}]}}, 0x30) 00:17:17 executing program 2: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2008800}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r1, 0x101, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x80) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000180)={0x10001, 0x8, 0xfffffffffffffffd}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r2, 0x400, 0x70bd26, 0x25dfdbff, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004}, 0x20000000) ioctl$EVIOCSABS3F(r0, 0x401845ff, &(0x7f0000000300)={0xfff, 0x0, 0x1da, 0x8000, 0xfffffffffffffada, 0x1fa}) getpeername$packet(r0, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000500)=0x14) sendmsg$nl_route_sched(r0, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x80100008}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)=@gettfilter={0x34, 0x2e, 0x20, 0x70bd2b, 0x25dfdbfb, {0x0, r3, {0x0, 0xfff6}, {0x0, 0xfff1}, {0x0, 0x5}}, [{0x8}, {0x8, 0xb, 0x100000001}]}, 0x34}, 0x1, 0x0, 0x0, 0x14}, 0x20000004) write$P9_RLOCK(r0, &(0x7f0000000600)={0x8, 0x35, 0x2, 0x1}, 0x8) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0xffff) syz_genetlink_get_family_id$tipc(&(0x7f0000000640)='TIPC\x00') r4 = openat$cgroup_ro(r0, &(0x7f0000000680)='io.stat\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000006c0)=0x5) ioctl$TIOCOUTQ(r4, 0x5411, &(0x7f0000000700)) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000740)='/dev/ptmx\x00', 0x400200, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r5, 0x0, 0x41, &(0x7f0000000780)={'nat\x00', 0x51, "87424f7e31c518c36bf55c0c2df9631279ee4f5ea3e26c35ed843aba962c1501110f2a24462917dafb94e8dafd3498cb20a5fe9037f642e93d0125018219efeeb00e5c69d8742efb50fa0d4f04fa46cf77"}, &(0x7f0000000800)=0x75) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000840)={r3, @multicast2, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0xc) getsockopt$inet6_mtu(r4, 0x29, 0x17, &(0x7f0000000880), &(0x7f00000008c0)=0x4) clock_gettime(0x0, &(0x7f0000000900)={0x0, 0x0}) clock_settime(0x4, &(0x7f0000000940)={r6, r7+30000000}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000980)='/dev/ptmx\x00', 0x80000, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x2) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f00000009c0)=0x7) r8 = accept$inet6(r0, &(0x7f0000000a00)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000a40)=0x1c) ioctl$TIOCSSOFTCAR(r8, 0x541a, &(0x7f0000000a80)=0x1) fchdir(r5) write$FUSE_DIRENT(r4, &(0x7f0000000ac0)={0x48, 0x0, 0x3, [{0x5, 0x200, 0x1d, 0x8000, ']!proc(bdevuserppp0proc$$user'}]}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000b80)={0xffffffffffffffff, r4, 0x0, 0xf, &(0x7f0000000b40)='lovboxnet1em1\\\x00', 0xffffffffffffffff}, 0x30) write$P9_RGETLOCK(r0, &(0x7f0000000bc0)={0x1f, 0x37, 0x2, {0x0, 0x81, 0x5, r9, 0x1, '['}}, 0x1f) 00:17:17 executing program 4: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f0000000000)=""/117, &(0x7f0000000140)=0xfffffffffffffddc) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000200)=ANY=[@ANYBLOB="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"/361], 0x98}}, 0x0) 00:17:17 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:17 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) fcntl$addseals(r0, 0x409, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:17 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x151802, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000040)={'bridge_slave_1\x00', {0x2, 0x4e21, @rand_addr=0x5}}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff020000000000000000000000008001000000000000000008f22751a98569050f4bb078a1b5f1d4f25824df0bd826795d3013037cebf60213e1c062d7eb6e"], 0x98}}, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64IPIN\x00', &(0x7f00000000c0)='bridge_slave_1\x00', 0xf, 0x3) 00:17:17 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = open(&(0x7f00000000c0)='./file0\x00', 0x400, 0x41) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x8, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xdad}]}, 0x24}}, 0x20000000) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/policy\x00', 0x0, 0x0) bind$unix(r3, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 1022.566740] audit: type=1400 audit(1560471437.930:5758): avc: denied { create } for pid=22314 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1022.637961] audit: type=1400 audit(1560471438.000:5759): avc: denied { create } for pid=22314 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:18 executing program 1: r0 = request_key(&(0x7f0000000000)='trusted\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000140)='nodev\x00', 0xfffffffffffffff9) keyctl$clear(0x7, r0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 1022.640236] audit: type=1400 audit(1560471438.000:5760): avc: denied { write } for pid=22314 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1022.691134] audit: type=1400 audit(1560471438.050:5761): avc: denied { create } for pid=22314 comm="syz-executor.2" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:18 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000000)={'syzkaller1\x00', {0x2, 0x4e21, @rand_addr=0xa321}}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300031300000000000000000000000500fa00000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000003ec5369300000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:18 executing program 4: r0 = socket$unix(0x1, 0x0, 0x0) setsockopt$sock_int(r0, 0x1, 0x5, &(0x7f0000000000)=0x7f, 0x4) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:18 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") clock_settime(0x0, &(0x7f0000000100)) r1 = gettid() r2 = open(&(0x7f0000000040)='./file0\x00', 0x101080, 0x20) ioctl$EVIOCSABS0(r2, 0x401845c0, &(0x7f00000000c0)={0xd350, 0x40, 0x3f, 0x2, 0x200, 0x8}) sched_setaffinity(r1, 0x8, &(0x7f0000000000)=0xffffffffffffff81) 00:17:19 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 00:17:19 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) setxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='system.sockprotoname\x00', &(0x7f0000000140)=']wlan0vboxnet1system{\x00', 0x16, 0x2) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) mkdirat$cgroup(r1, &(0x7f0000000180)='syz1\x00', 0x1ff) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:19 executing program 1: socket$key(0xf, 0x3, 0x2) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$KDSETMODE(r0, 0x4b3a, 0x80000000) 00:17:19 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup2(r0, r0) getsockopt$IP6T_SO_GET_REVISION_MATCH(r1, 0x29, 0x44, &(0x7f0000000000)={'ipvs\x00'}, &(0x7f0000000040)=0x1e) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:19 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff000000000000005184c8048b4d1db32d000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000fff6ffffffffffffff00ff000000002843939dfb1c15bb11bc77fb41a8b2b6ab9a19ee0857936e9a1e474c2458b29be32290a8f5ab4e2b"], 0x98}}, 0x0) 00:17:19 executing program 2: 00:17:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f00000001c0), 0x10) ioctl(r0, 0x8, &(0x7f00000000c0)="8241645174058e7973130d1f51fdcd16cf2d7ff99b746afa9a8ba776a92bb7e62b2d8fbd3e49662a60835384295a5ef7b274e9e094f500a87c8976d97a17c245c8d411bc1fc7c0e76e8316fbe55375bac78c100535b85c82d1194cdc2c8daf63dae627790bae721849024b49d921871e1f8c92ab4f979b8d2f01da1e848cd95b5c723458ead50ea85e65ae5b6915b1a17f89121b2cc34ca4f05474898148252a6a9ecf3e91161a1009ffc52bc6a22a4d118a39d4b14ead40541e93be0d08acb27f7b818c0791e738992da34a8792d40016d8173f8093cbf45d12c901") ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:20 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup3(r0, r0, 0x80000) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00', r1}, 0x10) 00:17:20 executing program 4: socket$key(0xf, 0x3, 0x2) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0xb8, r2, 0x0, 0x70bd25, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9772}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8cdb}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3d}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}]}, 0xb8}, 0x1, 0x0, 0x0, 0x1}, 0x80) 00:17:20 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) getpeername(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @remote}}}, &(0x7f0000000140)=0x80) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000104}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r2, 0x404, 0x70bd2c, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1800}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf23}]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x50) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="b3", @ANYRES16=r3, @ANYBLOB="100828bd7000fedbdf25010000000000000008410000004c00180000000875647000"/98], 0x68}}, 0x0) 00:17:20 executing program 2: 00:17:20 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, 0x0, 0x0) 00:17:20 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = dup(0xffffffffffffff9c) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x20142, 0x1) renameat2(r0, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") ioctl$RTC_PIE_ON(r1, 0x7005) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 1025.436779] audit_printk_skb: 45 callbacks suppressed [ 1025.436793] audit: type=1400 audit(1560471440.807:5777): avc: denied { create } for pid=22387 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1025.530284] audit: type=1400 audit(1560471440.897:5778): avc: denied { write } for pid=22387 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:20 executing program 1: r0 = add_key(&(0x7f0000000280)='pkcs7_test\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)="ccf6a542b4f5b167d437", 0xa, 0xfffffffffffffffd) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000380)='net/mcfilter6\x00') r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000400)='pkcs7_test\x00', r1}, 0x10) add_key$user(&(0x7f0000000440)='user\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)="2b44cacaa703d6d05e6d98b16fe3c12dadb6a4898664f42ab16267c9609918951f9074382e3bcafe61e527d09e2b1bc0999678e662ec265601abbfa0dc2f43de74aacfefdddca5537ae1b2dfbbb52a4db30606cc8aa65aa8a176286e579dd7618242fa717c6bf39ba43f62b21fcfb0ef83a5561f8a264929ebcead6196645086402c2e1f648d92bac9af6c03fe13902ca5825f8e6005a7eafd23e12602ba6dff2526b5947e7505d250312f6f0108065a2731fe2b4a865334729b8f6f23348874ac4e46f8a3b7e60c01ddd5098c657d77cde56721c45c1aba43e7275e0412", 0xde, r0) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000340)=0x2) r3 = socket$key(0xf, 0x3, 0x2) inotify_init1(0x80800) sendmsg$key(r3, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000000)={0x2, 0xa0, 0x3, 0x9, 0x8000}) [ 1025.617909] audit: type=1400 audit(1560471440.967:5779): avc: denied { create } for pid=22394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:21 executing program 2: [ 1025.625426] audit: type=1400 audit(1560471440.997:5780): avc: denied { write } for pid=22394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1025.640913] audit: type=1400 audit(1560471441.007:5781): avc: denied { create } for pid=22394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:21 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) clock_gettime(0x3, &(0x7f0000000040)) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000400005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000de570e97967b5ed4dfd404f1eccf07ac1ef012e21e2a45e2f2f16abbb68cdef87fe64bef405be722b91a4f6cf96424ca27539aa7d9e8a4009cc90ecd6b962727f043d87a80421fe4b11992b6d01de3c099d0a5684ff2e90d2f2162"], 0x98}}, 0x0) [ 1025.647767] audit: type=1400 audit(1560471441.017:5782): avc: denied { write } for pid=22394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:21 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00') r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 1026.020221] audit: type=1400 audit(1560471441.387:5783): avc: denied { read } for pid=22394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:22 executing program 1: r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x15, 0x4, 0xb, 0x1f, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_ident={0x2, 0xb, 0x1000, 0x0, 0xfffffffffffffeff}, @sadb_spirange={0x2, 0x10, 0x4d2, 0x4d4}, @sadb_x_policy={0x8, 0x12, 0x2, 0x4, 0x0, 0x6e6bbc, 0x100, {0x6, 0xff, 0x2, 0x4, 0x0, 0x401, 0x0, @in6=@loopback, @in6=@remote}}, @sadb_x_nat_t_port={0x1, 0x17, 0x4e24}, @sadb_x_policy={0x8, 0x12, 0x3, 0x7, 0x0, 0x6e6bbb, 0x8, {0x6, 0x32, 0x100000000, 0x42e, 0x0, 0x4, 0x0, @in=@broadcast, @in=@empty}}, @sadb_lifetime={0x4, 0x2, 0x8, 0xca, 0x5, 0xef8}, @sadb_x_sec_ctx={0x4, 0x18, 0x81, 0x2, 0x14, "a956cbed316e354d9f71fa6ab686afe986a16764"}]}, 0xf8}}, 0x4011) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a14ffffffffffffff000000000000090000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000900000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:22 executing program 2: [ 1026.033411] audit: type=1400 audit(1560471441.397:5784): avc: denied { read } for pid=22394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:22 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, 0x0, 0x0) [ 1026.143028] audit: type=1400 audit(1560471441.507:5785): avc: denied { create } for pid=22394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1026.147731] audit: type=1400 audit(1560471441.517:5786): avc: denied { create } for pid=22394 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:22 executing program 4: ioctl$PIO_CMAP(0xffffffffffffffff, 0x4b71, &(0x7f0000000040)={0x2000000009, 0x4daf, 0x1000, 0xa, 0x5, 0x23}) sendmsg$key(0xffffffffffffffff, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000055ac7dce7aec4e1e000000000000000000000000ffff000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff02000000002d0000000000000000000100"/152], 0x98}}, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, &(0x7f0000000140)={0x20000000}) 00:17:22 executing program 5: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000600)='/selinux/avc/hash_stats\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x428) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000340)={@mcast2, 0x0}, &(0x7f0000000380)=0x14) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000440)={{{@in6=@empty, @in=@rand_addr=0x1, 0x4e24, 0x6, 0x4e22, 0x0, 0xa, 0xa0, 0x80, 0x7e, r2, r3}, {0x75e, 0x5, 0x100000000, 0x3ff, 0x7, 0x75, 0x1, 0xf4f}, {0x8, 0xdf, 0x4}, 0x6, 0x6e6bb8, 0x2, 0x0, 0x2, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d4, 0xff}, 0xa, @in=@local, 0x3501, 0x4, 0x3, 0x7fffffff, 0x5, 0x10000, 0x4}}, 0xe8) ppoll(&(0x7f0000000000)=[{r1, 0x4000}, {r0, 0x50}], 0x2, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)={0x8}, 0x8) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000100), &(0x7f00000001c0)=0x30) 00:17:22 executing program 2: 00:17:22 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000540)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) 00:17:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x20) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000040)=[0xffffffffffff0001, 0x17b]) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:23 executing program 2: 00:17:23 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_ident={0x2, 0xa, 0x7, 0x0, 0x5}]}, 0x80}}, 0x0) 00:17:23 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r1, &(0x7f0000000240)={0x90, 0x0, 0x1, {0x3, 0x1, 0x3, 0x10001, 0x4, 0x1, {0x3, 0x9, 0x3, 0x5, 0x25, 0x6, 0x41e000000, 0x4, 0x9, 0x0, 0xd85a, r2, r3, 0x7, 0x6}}}, 0x90) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:23 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket(0x0, 0x80002, 0x2) bind$unix(r0, &(0x7f0000000100)=@abs={0x0, 0x0, 0x4e23}, 0x6e) r1 = socket$inet_udplite(0x2, 0x2, 0x88) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) r2 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0xc002, 0x0) mkdirat(r2, &(0x7f00000001c0)='./file0\x00', 0x24) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000180)='./file0\x00', 0x0, 0x3e3) 00:17:23 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) prctl$PR_SET_MM(0x23, 0x9, &(0x7f0000ffb000/0x4000)=nil) 00:17:23 executing program 2: 00:17:23 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10}, 0x10) 00:17:24 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000800005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'icmp\x00'}, &(0x7f0000000140)=0x1e) 00:17:24 executing program 2: 00:17:24 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x5, 0x10) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:24 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$inet_udplite(0x2, 0x2, 0x88) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000100)={&(0x7f00000000c0)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001440)='/dev/vga_arbiter\x00', 0x90440, 0x0) sendto$unix(r1, &(0x7f0000001480)="97966e3fb8454431a6e31eff6c97545db550204c1d04bea371", 0x19, 0x20000000, &(0x7f00000014c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:24 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x101000, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000000)='posix_acl_accesswlan1\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:24 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x101000, 0xe) fgetxattr(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="7365639f563b422b45512d215b6e7a6caa1f9ab9aac47f6974792e2a00"], &(0x7f0000000140)=""/6, 0x6) r1 = socket$key(0xf, 0x3, 0x2) openat$uinput(0xffffffffffffff9c, &(0x7f0000000180)='/dev/uinput\x00', 0x0, 0x0) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000200), &(0x7f00000001c0)=0xc) fcntl$setpipe(r0, 0x407, 0x0) ioperm(0xf0, 0x100, 0xe787) 00:17:25 executing program 2: 00:17:25 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) read$FUSE(r1, &(0x7f0000000140), 0x1000) 00:17:25 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10}, 0x10) 00:17:25 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) futimesat(r0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={{}, {0x0, 0x2710}}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'irlan0\x00', 0x2000}) 00:17:25 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000e60000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) 00:17:25 executing program 2: 00:17:25 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0x400000000000004, 0x1, 0x3, 0x2, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x4004010) 00:17:26 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) set_thread_area(&(0x7f00000003c0)={0x7, 0x100000, 0xffffffffffffffff, 0x20, 0x80, 0x0, 0xffffffffffffffe0, 0x20, 0x5, 0x20}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x100, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r1, &(0x7f0000000780)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x1d4, r2, 0x300, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_NODE={0x38, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x13}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x38, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcd4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}]}, @TIPC_NLA_MEDIA={0x20, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x38b3}]}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x10001}]}, @TIPC_NLA_BEARER={0x1c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xd44}]}, @TIPC_NLA_LINK={0x108, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x54dc}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x33}]}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe99}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5b1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x1d4}, 0x1, 0x0, 0x0, 0x4000000}, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000380)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x74, r3, 0x600, 0x70bd2c, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x20040000}, 0x4008001) r4 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r4, 0x801, 0x70bd27, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x4000004) 00:17:26 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0xffffffc6, 0x2) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000100)=[0xfffffffffffffff7, 0x8]) fcntl$notify(r0, 0x402, 0x4) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:26 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x400800, 0x0) ioctl$TIOCSISO7816(r1, 0xc0285443, &(0x7f0000000140)={0x10000, 0x5, 0x1, 0x1, 0x6}) set_tid_address(&(0x7f0000000180)) 00:17:26 executing program 2: [ 1031.339842] audit_printk_skb: 12 callbacks suppressed [ 1031.339858] audit: type=1400 audit(1560471446.687:5791): avc: denied { create } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:26 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0x1) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)={0x2, 0xa, 0x7, 0x9, 0x4, 0x0, 0x70bd25, 0x25dfdbfb, [@sadb_x_sec_ctx={0x2, 0x18, 0x4858, 0x4, 0x6, "ce56429a0092"}]}, 0x20}}, 0x40000) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0203000313000000000000000000006433000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a00000000000000009717d92df4776ad87793baf2c024d34c000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff02000000000000000000000000162e0000000000000000"], 0x98}}, 0x0) 00:17:26 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10}, 0x10) [ 1031.366763] audit: type=1400 audit(1560471446.737:5792): avc: denied { create } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f00000000c0)=""/55, &(0x7f0000000100)=0x37) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:27 executing program 2: [ 1031.369238] audit: type=1400 audit(1560471446.737:5793): avc: denied { write } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1031.412362] audit: type=1400 audit(1560471446.777:5794): avc: denied { create } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:27 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x410, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40001}, 0x4008000) [ 1031.440906] audit: type=1400 audit(1560471446.777:5795): avc: denied { write } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1031.834705] audit: type=1400 audit(1560471447.197:5796): avc: denied { read } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:27 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)=[&(0x7f0000000180)='/proc/self/net/pfkey\x00', &(0x7f00000001c0)='ppp1\x00'], &(0x7f0000000300)=[&(0x7f0000000240)='eth1\\\x00', &(0x7f0000000280)='keyring\x00', &(0x7f00000002c0)='\x00'], 0x1c00) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0) 00:17:27 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 00:17:27 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x3, 0x2172, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0xe000, 0x3, &(0x7f0000ff2000/0xe000)=nil) getsockopt$inet6_buf(r0, 0x29, 0xcb, 0x0, &(0x7f0000000000)) [ 1031.878978] audit: type=1400 audit(1560471447.247:5797): avc: denied { read } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1032.180753] audit: type=1400 audit(1560471447.547:5798): avc: denied { create } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1032.183082] audit: type=1400 audit(1560471447.547:5799): avc: denied { write } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1032.226992] audit: type=1400 audit(1560471447.597:5800): avc: denied { create } for pid=22523 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:28 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = dup(r0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000000)) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:28 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000000)) 00:17:28 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2d9d726f75705f69413d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80000, 0x0) getsockopt$SO_COOKIE(r1, 0x1, 0x39, &(0x7f00000001c0), &(0x7f0000000240)=0x8) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:28 executing program 5: r0 = dup(0xffffffffffffffff) r1 = accept4$unix(r0, 0x0, &(0x7f00000001c0), 0xa00a0cd7057330a1) setxattr$trusted_overlay_redirect(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='trusted.overlay.redirect\x00', &(0x7f0000000140)='./file0\x00', 0x8, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000080)="11dca5055ef9ceec7bf970") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) io_setup(0x1f, &(0x7f0000000180)) llistxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x80) 00:17:28 executing program 2: rmdir(&(0x7f0000000100)='.\x00') unlink(&(0x7f0000000000)='./file0\x00') 00:17:28 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005e60500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:29 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000240)="a2ac", 0x2) write(r0, &(0x7f0000000140)="cdd86e3c3c1ee58f075c308a1f92ccd68957b10c77f40867e456ec4b65aead89c4847be7b62330f7dfc483940a17c645f11d7a07a2361f7fe29e5e8b9e8b29407e94e7741c691d3a471d8f86772648dd32c296095a1ec09dc2a40db8ef28982cf537fe03b726bb0d465dc00ad89949faea6629a281f785e9eff16bd08de6e76bc315d35b95f633dd13c7d2cfc276215d39acc5b7ec44a2a62b412032cd898f2bc73671b1dfea44b74604684ada66eed7fb83ad33b36cac93d9d2ef8c2afa50464ab4560efd", 0xc5) 00:17:29 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x36) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) setuid(0xee01) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f00000000c0)='./file0\x00', r0, r1) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) setsockopt$packet_tx_ring(r3, 0x107, 0xd, &(0x7f0000000080)=@req3={0x85, 0x80000001, 0x8000, 0xfffffffffffffffa, 0x100, 0x7fff, 0x1ff}, 0x1c) ioctl(r2, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") rmdir(&(0x7f0000000100)='./file0/file1\x00') 00:17:29 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_ident={0x2, 0xa, 0x100, 0x0, 0x72}]}, 0x80}}, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) sendmsg$inet6(r1, &(0x7f0000001740)={&(0x7f0000000040)={0xa, 0x4e20, 0xfffffffffffffff7, @rand_addr="0c509500ae2070561fda90849eed4df3", 0x95}, 0x1c, &(0x7f0000001600)=[{&(0x7f0000000100)="09ea011f9d16d197652a0da55a6d25d10d1dcd3c639c66d4b2fc44580f6ba3b4918a0a64f83ce87149f1346badee54472b5b209d6f99791ec67b7a67c3cdd63fae5f70de77a53e375a4eb42f90cdbe24402e49492f1c6f98b10fd251e1c0b9d8c9bc35075862c34ebb8057bfa8f5bc71f166dee35397b9c47edfbe4823e96230cb19e958796ba38b0ac3e54c8d8daf242f68a9cc7afdf1a04dd3773017146080f851d1eab246f6cf5d8c0626db4bd3809e57032f180fdcedfa3118a259053cb2c1ed45f12bd3ad940b5dfaa1259ddd4397b49470660414d33e9bcd0aca2d9a0cfeaee8a7213b7eb532b977a5af508db92075843344dec834", 0xf8}, {&(0x7f0000000200)="46ca44a29e1268d6ec4af30596d45b4ba5c5faa04a79ecfec43121d74a825e5299be8cdbc9a2edbf44c7fb3405cb2e4f56d5c27ff1316043832969ce48b104eebcd1cf9682705b96", 0x48}, {&(0x7f0000000280)="b39e0f04095339eb83071cd930d141075bd7a79ac5a21bfc0672f31257ea9966760bceff5b7635aba2e72ec4bc31cf659e7bd523260e0877fb8bc83401df75628f553178926be1b4876f71520fc974257c5364a1dbbe79820419fda6fb63be3a21c4edcb6b3a12bcea4d2a6d4c5f09fd14eaf3185391a3cbedae5855a14fbfe922e2836c3d55f8ad813c97b21877c5b00cb8b5771d976125263b51890a4656abaa417587fa0ce7835de92cc2cebf9d5d2cea0b393c70f3b65020d90600601f2d322d8a5e8921a1c52efc895c6734094e3623bdd26047e4b5104dd049c4b66d8fd8a46d6d8ec689060c4a7e4c744e262dbf5bd098058d9cb19006f8776850d4be697d69225b0e966153346fbd4f4e3ea121bdbc936e95c255e38cf11ef8cee7129fc102b540200f40cd138fc04fba86003b280713576be1d86033713928b56db7d6e86d0a8fd3fd5dbf26e7e8d17078ef8156d1abdf5539b8f436cfe230866fb25cd6a218d16c8c38a6454847ef2b7f2ed2d3d4bf1c4dfbcc94b30a5f75a4c2cc4ccf6a4ad8fc865f3cdf153738f4e678ada1c141b4603e5add4c55810b92e2693b167c9bc3ab24114a55a3fa558444474bf715edb712204704563bfeac8005942c8a76115f17bcc736ee78dc36196ffb1b2c5ea300e226dd78f0e9cf4e9308b6e34281b77486e5c2f8a70265ba2bba8262163f3b7858f324130af966f3968aa4e3f115473db5de2a6bb07c7caaad2e9df2ba02b16825523900669c46aa99424337f6190839349062a05c79f0e22aefbf5d211f544effaceb096f004f0416b6bb05075757692d2d61ca9294b5bc511e3c0088ec5bc661a393df2f827d6407022b8d905bdaff1941bcbf110f00b3728eca8a047167baec6892aa9a57a0318991f639a1d22f3652f89db3c377c790440a604821f39159e17382ea05131616ae5776cede1a54ad9615c5ca4f9f654a7fb85ebda0b857593c2d282b48fb9f5d14bf660c38c38127cacf0b942ec3875db67e1a7e1fa3caa203e2a9768e44192cf50292de9e989cf8f890a8190fa202461443146f98ba9e4ed6ac0bfd49300cac10d664c4d89d3a475fdc510e3fcdc72690f3b68fee2b51b8306b2e4a44b67cddc9db61ca7d188bd30aeb81358ac2047ab3e87967f4c879501deaa0af71a63ea750b9c864cb8fae1bd805b83687bc759e2a447517d69f5de406dfbe68c209fc05910f88b969aa476a5cc2f6c84eedd1cba2a823e84a23ca70c16f2448b12f07ce9b842d8c8db9b187ca2d35a5395aa65bb889cd1f41b52a9a182a59d124fca07cfefce049b52b8264573e33a8d2eee5868f9dd9cd9f8afaaae64e0afc9a31cfebba3115355fb889c3e575d46d7390ebcadd439239e0f8dfce229663be9e8e392c1f82cae9e86a7bc629631f888bc57d0e136daf34a0e04dfd37536df46f91ae95297d7f2aeb337d4a73e8f660a1448691f058225cd9c5554d68a7e0a74a3e7a482c24204106008b6874f8a21dc221ec954dc5f68e2921196efae763711f591197836acbbbe8ac3d0035dfe348b1d6606961d21cdea40607070efc19c330eeaf0b28cf27672c1ddc13c3304a6ee43fb3aa342e0242bc1b126dbc95c35d6594986b0ee6df1901535cff00241081c2a11232be5be24eace108b034b636a5a6895fbd11748fd476981e58c879f5eb65d9b9f29b3bfc683511f2e308eb1d622b4f52ec89ba2b69287a8a13eba20e1b0b9ae5417a85bc19a6c673762c771f6ec514c1745cd37c330c102e31c7c0492736651e7e3680cbebdd79c45c3aab4e249ca1dc2b65893c8d4ef48de412fd1dbd94d4dc2d4d883a20e2438dba779b133f5c40a19b5156655b1f5aed1f1c733c0f6bd29b30c646a340e4d0a28f4b1d6e3162dc4de297e0a39427c51912fea200731421a025db97d9637687fb13ac41dd2c79be827140c697f57cde4e67e3600b5990f71440fedf5f16937dd60d7ff27a8f25611d7d8595f8805b47ee1d583ecb4d20690f4b53874dd4e27ba37ae9a0d48128004962eb86bfadde5afde0b6edecbe611b278a02878b6574d47d253787e2b8f562df4a0223f466127d7b4ea6ffb36c50fd1bf595aca3768df3ea4c8310ebbf4b136980c6a71149d3584e3da3621d59c86b6f7afe29f2bee937ab465c20926e23d6e21d7a17c9801760de1c9b6d54201281276bc93f57dc18499f74321df9b7ee63c0965e63bd9ad96c0772304c0987cf480b7edee3904653ff2910b58032db9da4febbb390308baa6097ccf26aa6f9f7dfea60504614447574c351656c977004c2b7c9a35bc2c597f4d16efba3a17e70005072ca632370bad12cb60ec40755970b3f40651e2065161fe64a05210f3db112f66a427b2322a275b6e804bbafeaa6310192b61e4236801f7bd95acce986588969aa35076563b4e5620bdccfb01cad11264f5a2aefb78350e7415581f5c6f7a90c13780466b08125ea38e4695c1801e86829dc74c6a5c9eaf2ea709391ad615d4527dca8f6bd2bdb0882f4da08c3e2282981ee8dfe6957088f74c0510cf748dcc87d587680ff910a44e608b9d07f6f656db126f4a98056a25c8a1641380452d3a53a1b1a7c64604ce233ea4fbace9b90bd67515b179d568231f0d0ffa76841bb22353c7e7b0d056fbdd277408f429ad30b50ea8cd463380258d54e82292b44e0ef0452de7ba50924ae49090fe2febf129ba1c92fbe43cba8f0482a4bd37227333b0587085e0536b9ae31687352721afef48e4ae5104ae7bc87b58a052fc30b4757dd2a8f82b9be7b33281a37f96244dafaaa71ccfce142024c456be8294114c152252fb9408235595e6633d0111b27142691a97185c1f86f434376afb77c821034bbb02a49a9216d65dc8b4415baaeaabf30ae9b56d41828bbbe70e0996adf09b22b087af3723dd52dc6fba20a015a2726caa04ddc937d0c58ebe5bc25207c8b5b035dca6a367341efe09b02008317bb546ce22d644fbcaf8a859507a9833a0b0bbb91441a00d402c98e10636dca3e23d99c4c06fe936de48c5840cc60a1c4c23fd48f4168edacd8768bf3483a188f04764e670f7855111097de951296b146ca91798459751243f4b8a6c85c26701726efee95b7940965cd85a09c0e6c4951045f45d55e2985bfaa0dec2121753386c211fb39ed5519ad90e92fcbbcb66a62944dc40d953db7b36eb95b0a733dc04c5302b7434f1e57a21ba36487430ec22d1e7f680dcc932736ae5847ff259a5ead84a3ead9f360cac99d46bfa974ca6d431855f53813ff0aba7a34988e20fd467b05590c56f83176c325168248f16901ab663b9fcf07fe5eb968443d5441d52608e4b5377724703421662c5f742db061e05ce33014d9ea8f2ac4327e609dcb8cab638cfa4890ad7108647689e01d5ab5a707a13213cc068f9db2cb9412104cd007327366c938c1bf9009638dcc2b4c8ceb353f9269e474d9a1f344812e50e132420332e3d49cf6cc9574e489a570c4672c395b2b6d11c59a7922a0fde12b51071d5c5549d2a9c2628817805c6f4b4db91475c763dab5925e3e5cd9f33eadbb757dfd3616f3ccd8085fa4b7e3a6dde565f3885989c0a2555410504c0cd7dab528c122adca4e1d177be3be63e34c2ee9a5a50561cd7a5bac1f46fcc561f7a3d70f473dc2c6c135f5420c07c0a080b7621108cd2b88c6967a67d0228b4a525a0c9116d1f8e41155c8f6cefcabbaed0cbe57373ca06561c1ce91a18643b7a489e75e0ba08d91cb6bae02b7e583a25ff907aa955e8f95743c03eb47362b722bea1eb5ddced2417ff060839cf69db1503831c85c6235d131336f34007fe9fe8fccaf64483fa121bfcd3430892c79da88d8d31b3d4dbfc327ee9ccbce5e03f5ec133a038b05d6a8326ba5327e057be0ca41cd15c95d31e48a3b976e3bfea374a4a964dcbe8bc32f73530aa36fd53b6f06d55e023f0e77ba7069df1cfd184a8040cd4dfd8ce277ef4154acbb2296f1e81a4424072d2068822978a3d626f1aa8505c1626f68b6009bbacf7559af302c901dad0e39a49502d05bfeeda8b1c663ca13be77af650a856fd8e4ee1c827486138d611d3aaf963a05b0a47dffa52643aae0876a6cdcda267959c28b972ee746ec2c6ef62a766095c5a5cb75687dec7e11c35d3f83b0ef6be58da6b2c7105db9736395ebca1b186da2487d4f19ebe134f2f3255f39ad1199adf6a168909b2cdf5d2b402e90c12b70b6faaa5c5ef5bbabd97754647f7fca470753d560a53045e8e31247c9e20b2c38ea7538fb43e5499a8df11612d4473dc3fa1d4cfa27779e8c6fa0f1364f11fd1d2c14e72cac96b35669bfe807a00671f14c5667357490e2a1f0f004347a37e80ee40106ee25dec294d2146b4c4163826a3a2cebdb2beea74d19d1527b76e5301ada504c2eb3b589236a3ed9228b37daacf69c34074d4c68a90aa7f9246b38bf9445112d39ff6dcf805eee4389de5d5c608823c82061bd090a90d8ca2d0f713ea7a1d506e1d293f3493d90037e3e68392757fb9a0e82703d8cfec9266e4851db77317c080d83e99ca70bce7026029b14fc7ff811731d15969c21feb17d96764d77fb6ec4320917dee483e7139f3a314ebc3b21a9ac1444785d0bd37ffefade0f60bb4357c1a7db5bb813cd31fca6b0de6eb7dbd5bc983982faeac522df6e377c0ef42e8d81fba7619c1c3c4f567e8fb21fddf94817b6d8108ddf42930345eec535193af33304d393d78d042b08c0800e914050a6386d2b59a35f14e181169f9467f575c359162a911bf2c3352e3a02a9608d2d5af09e88f1f82a3f9ddb6199ae951d5f7b50056597e8e9d7f5f6b04eafaed59abde95c965eb89ba3124ab6ffc5df8900c79e4653688e0f523b3a96c672d962704a609102bf8467ea9e3d22d36b098356e843bf48d308a0bc41d5d452d64a4f166a258ff76fb0356debabd698d51aad247511194459417ca9681d5a709dc7d0bdfa5b61f15dcb10f2dd3e169bc714620796112a00c28a21681303afe949f5ee61f61ed20594cf1ca8b9fb18bf1e80b7352aefa7796e74ed10245b8c80d1290496961d1c2886bfc85c6be017a9ff681a8756a70d7184e90533a612831035cd89ee9b99634abb77ead5cd0d13ecb8f806794cea1eb7c5e7947527b5c953628f844170ebd1b4b601bbe4fa853f381fd674745a078652df5ab812473de1d38bfaec8495f0e1e70787d8ee0c6f2d985c94b0db88e3c71e2b30cc07ef54ad386a000b74dcf28deea0826061cdb120c7e14d29af9ffe161a262ac2400c2a74fd7f61a6b75d358f28f2ddaf9ae0ac0e94e71c5c7d506a925e77ce9e78f6ca0833f95e3d7544d7cf224ee91a47d7788e98183e9cd69fccef543a9a5c14701ba64fc31e0ffc151981688dc15347d65b548a607b72f76f79076eaca09d8ccfbb972cbc9d79c8a947043e1590739f8ebbd2daf7cc98c9c89f34fb0c09a6dbfba51166663b8ac3346bec85cf8fbd8532a0f09370f110e0af4275be02cf441cd174bef25a6fd3dc35e523a0b2b0adb65495ed456257bd11c26b923251d33d0b3a7815f257fdd0bd8c10e097e0bf9d4b168c2ca608a435dfb89ac475bf958b03f7ccef3c299de45714f60e21c28a45ad8805f342a05f75cecef21d1e0a9345968f08b4c9276e7a849f3d870713506a5f1b6ec322929dc12208629b2710dcb4a59091fbbd43bdb61a66ac00f1171371b0c2accace12825f04148b2a37b15e3b55826e3f00717baee73630cfafd9a185fa5193ef11594674f83fd56154702e7d951dabae2bd5b092dd1cfe", 0x1000}, {&(0x7f0000001280)="e20d8938a5546c4669c1efdac28b5d809239dbbce82b6fa1c78a93242990", 0x1e}, {&(0x7f00000012c0)="fb83191141d97bc84321d55e6cae10f0f7d089e18a3a885f5307fe8148", 0x1d}, {&(0x7f0000001300)="78fd18e934dc7211a5fdcbdd5e91159fc1d212e115be6f66ed532fdf9319", 0x1e}, {&(0x7f0000001340)="a9ec5222155b7285266499826480e5f3435e9a9c61739193d0781be47fecaa6a59110bb8a8343016314132add40956", 0x2f}, {&(0x7f0000001380)="515856d124a1e5ba9fa7d420c5773f1ccf40d49f9ce3d58b268f6661cb63b19dfd414f1d7e225613e94aa2afe9cbc015be2a5851f3983efd2ecb2b22e31a600570e534ce1df73bf7a179cbb911bf0907a235204d9b2a4ee54c4af5d99ce29124c5906f", 0x63}, {&(0x7f0000001400)="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", 0xfe}, {&(0x7f0000001500)="8b6c535d4544fbfd00e8e8230c34220635c9f60d30e6c559ef3de88252fd4c948f47a074fcb76d1db01e0fead02989f391f1e0953882f05c7f934bf2bf5c26d4592fc3586cb11d82008fd2ba4a6b83042e9bab3728edf9547ad909419b48d872c1f27d0ed7b8b4e3ec0d1b5c593cdbb410d12e9c065b64fb38b9535dd4159c54e083f6a2bd1e1b0f3d8fd7335295060a18feff3041eb0ef4066e89b66ca68c70c45bf76806c62ede2501ac7024bd05d92975f7e8ff45881f35170f07219be26643e466c413d707bd04", 0xc9}], 0xa, &(0x7f00000016c0)=[@tclass={{0x14, 0x29, 0x43, 0xff}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x84, 0x6, 0x2, 0x1c000000, 0x0, [@ipv4={[], [], @multicast1}, @remote, @mcast1]}}}, @hoplimit={{0x14}}], 0x78}, 0x800) 00:17:29 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r0, r0, 0x80000) linkat(r1, &(0x7f0000000100)='./file1\x00', r2, &(0x7f0000000140)='./file0\x00', 0x1000) 00:17:29 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:29 executing program 1: openat$full(0xffffffffffffff9c, 0xfffffffffffffffd, 0x4000, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0xffffffffffffffde}}, 0x1) fsync(r0) 00:17:30 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff80000000000000000000000005000900000000000a000000000000000000000000060000000000000000000000000002000000020b000000000500050000000000ff020000000000000000000000884186252e06188185e603320000010000"], 0x98}}, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x7, 0xd5, 0xffffffffffffffff, 0x7}) 00:17:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @aes256}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x800) 00:17:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x148, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) socket$unix(0x1, 0x5, 0x0) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/policy\x00', 0x0, 0x0) r2 = openat(r1, &(0x7f00000000c0)='./file0\x00', 0x40000, 0x108) openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) r3 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) read$FUSE(r3, &(0x7f0000000300), 0x1000) connect(0xffffffffffffffff, 0x0, 0x0) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000100)={&(0x7f00009fe000/0x600000)=nil, 0x600000}, &(0x7f0000000140)=0x10) sendfile(r0, r4, 0x0, 0x800000bf) 00:17:30 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0001000000000000000000000000000000ffff00000000000000000000000005210900000000000a0000000000000000000000000600000000000000000b00000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010014000000000000"], 0x98}}, 0x0) prctl$PR_GET_FPEMU(0x9, &(0x7f0000000000)) 00:17:30 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff020000000000000000000000000001000000000028a8f599000000"], 0x9c}}, 0x0) 00:17:30 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x5eb6fb9313053c0e) 00:17:30 executing program 0: ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000140)) r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x2000, 0x0) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000040)={0x1ff, 0x1, 0xd6}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000010005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x0, 0x4000, 0x0, 0xaec2, 0x0, 0xfffffffffffffffd}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$UHID_CREATE(r1, &(0x7f0000000480)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f0000000240)=""/171, 0xab, 0x4, 0x2, 0x7fff, 0x7fffffff, 0xfff}, 0x120) 00:17:31 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = add_key(&(0x7f0000000140)='cifs.idmap\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)="eae165e9656c85a1eee56357a0c1c6e8d0eb31ea1493bc6bb028b687c7dea8ffa11cdb902a341e64acbc1b060bcfbbbb1ff8e3701596df92dc22bba8b3786204d7bfeba753ad787a0aee7ffa5042e2fed04208c0a5ffb2cc588b912d8208fcac0b192254215c1bf4a76bc996dda1ff3e61c4fad968ab46df65a71ca2b3633b000712b20465e54848b7e913197f899c9dad5f35c1b309024c473ab2df681f065e996a91f11fb613a3b4df7379e7e5999428f54011382c11e87a5ac87903fae00faf2ed92fbb638466fe0b004a66fef0baa0", 0xd1, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, r1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000000000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:31 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000380)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) mkdirat(r0, &(0x7f0000000400)='./file1\x00', 0x2) chdir(&(0x7f00000003c0)='./file0\x00') symlink(&(0x7f0000000140)='..', &(0x7f00000000c0)='./file0\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000580)={{{@in6=@dev, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000000680)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000008c0)=0x0) r4 = getpid() getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000028c0)={{{@in=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000980)=0xe8) stat(&(0x7f00000009c0)='./file1\x00', &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fcntl$getownex(r0, 0x10, &(0x7f0000000a00)={0x0, 0x0}) r8 = geteuid() r9 = getegid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000002a80)={0x0, r0, 0x0, 0x18, &(0x7f0000002a40)='vmnet0em0lowlan0/vmnet1\x00', 0xffffffffffffffff}, 0x30) r11 = getuid() r12 = getegid() sendmsg$netlink(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000480)={0xd4, 0x10, 0x100, 0x70bd2d, 0x25dfdbff, "", [@typed={0x4, 0x56}, @generic="d6e8197c22c39504931da0c3c7151f8e48b68111371b9fe9f96c902d2d83f474b6af8e78304f39e834dffa3f9b114624a9980edac25285a1b574cc5af6f8bb5c5fc54366302377a351bfade068bc00b6516976d315f4b0cdab93129f4e9ee8074e4b0691b6d8bdb6daee7eefd81a9c4834a463725ca637fa790de4354f87f0d883dc11a6377e6bfcb7c58c7ab9acc058b77504930cdbbd2080c41bc864afd7804afd892c0925c75ab0a9c32dfd552d1a701e3d998991ecf3b9dc031f44"]}, 0xd4}, {&(0x7f0000000a80)={0x12a0, 0x14, 0xf10, 0x70bd28, 0x25dfdbff, "", [@typed={0xf0, 0x1b, @binary="b6c2368fd346873dc8c530c5c573bf11761390fdf4e1f0c0f4eb4e6bddd35605564f09258c680049a64fb612a0ff7143b5cdd17ca15389951f06fdc202fbd1eb9a1b84ae4005320dc0dea037eeec69d99b0e250ffce4b1ce9ac099923bef283b3f412ef770985166011c531c6912f6c88fd101bb30521019b24ff8107d3f67876c792abe29560e361199f8287eb0adf23bd94773130af062f7558ccab9348a0bf5fb7ccc57480acd6cdefac0e738864916ee14fce4fcf074d606c73e759ca13f4388f7f1cbc6ab7389974fc61306042549be1476c950eb3c6a20708c932a512232431fe5c2d64188fdf9a70f"}, @nested={0x11a0, 0x60, [@generic="3362f81e8e55783e86a2fd1f2c0c63a2d3e4381e8e74cd6b64a3e47082228c5d9bdcfc5857ef563b4f0fa390743546ebdc1ef1ea434c9f7980b4bb0f772a87e88f0d268d96c563877108a7410a498cbce11c14065561e6ffa2b29611fb4e8e0618f08f5510c609450247bf35ce8b4f09ee0ce91c68365f89a9eeeab2ebce58b1ce88c4b257b087b2b990a5f08f", @typed={0xc, 0x1c, @str='ramfs\x00'}, @generic="f06d9e74d8e5876661d2e15c5daaec8d4c206c1cac18cb2549db2d802d01e401eeb7d82c1d8b71fd8f559e12a7e566b2d3efcb4e4d73c38acbb694e909af418de270ff3f17cd3c2a615505a10184f4fe635a5daa6eb45e9811576a05a00e8671b934f7689fe8e8bf7b65a3c719a79f15a0d3e9bd7f2920403eb63e0f199306eb51d59f7709eccedc09ff783e1d919962f9118af240c9f6246de94c10cb5a5b9477419da23749aff003167eae6d09a4716e0af3e5e3", @generic="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", @typed={0x8, 0x8, @ipv4=@local}, @generic="22e80516940fa3855df585c95f7be0a5a8dea1c67c671100fa94467805569e3d9e4c3dd5c2ce2f870af4a83cab7dc046dd451fef04300076f4d107d3", @typed={0x8, 0x79, @ipv4=@empty}]}]}, 0x12a0}, {&(0x7f0000001d40)={0x774, 0x1c, 0x800, 0x70bd26, 0x25dfdbfb, "", [@nested={0x15c, 0x5f, [@generic="ec79b470dfb4773ead43883e553117d15a71118148fd1b1b1db94703ec7b97c91c0914bcab9c35e7e1dda71ec345d670e31c40e6c01f26df900d69be80e4be05c32eea28084c70190fba763888183e806e99226433f37ea89331546033b9de126d527efcc727ab57b10dbac8c1414e995f83d5e40d8a354067e4eea8c2484072dba5b5bb9bdbad8aace2d3c81ce5e1b8ecf649e8aa042a99e72629360175ed18d90f11383c4fe20d010221d6046d40c9f6771f25f7fc93d60242b31f02ad80b8da7ba04292b6950ad7ef336e7802bb71eafdbdb09c3f1c05dc0470a3de4700ecd3ec0d2d3bb6bfe6e8", @generic="a8d5c97362e341bd7b82ad393d88c1d39652cac6e45028be0466993761185764dd04bb4d845d124c407604907b03326e3af50015b3ba15b50acf75755cb9ea164815c7e3808a751ee28948ae0aff17eb2e3fc419d9d0a4004ddf6f2f0aab8e55385dc2046f9265", @typed={0x8, 0x1d, @fd=r0}]}, @generic="36b605250b2e35b6d73099a33b9bf92e761773e58dc66a7a2eedc3833d026da5c0467b76df68a49b183e1d3d0f32ff96092f05a5dd480dbf7ae07ae9a4009acb44eb63074d5f5ad4e70c5fbc315bf5d8cab0e952e850a4a9cc7071929f39a5d51c77733293fc87eee35c9443862e85024cc746a9d2578380524f0d5b436030384fee9856626974b30157b7df8bad2e0f0ff533524acf896da575ec71354453078c1f5f41ff154b3e83551a0f57216522ef74fc", @nested={0x90, 0x1a, [@generic="0dcb3a586b307a3590f2f704760dc0c3dbbbbf89c82df113b88ba7390292624d738927ff06510257a806384e6ea1dbc78392c6520335874c", @typed={0x8, 0x0, @uid=r1}, @generic="28e87db9c3ab316d57a50eeb22b4a8cd6ea31299f1329af4211fae8c8166a25570760e5a9923dc43d361eabf117c75bfec0384f703f9b9691299bd3077dfe1afe1", @typed={0x8, 0x7a, @str='\x00'}]}, @nested={0x260, 0x60, [@generic="2a02a973fbe17697a5a5d4b561d43bbde8a2f3347e3a56496f35ef1330577921f9f2c2ef4a909eea02cda4f865bc40484c45165f4cd1ab44aae32d3b2bbc732c841bf2180158fe5d86039ac7319c0565822a91e401579a569b4ec78c9b36cb7bd7978836573a0195d54b77f993b0e8e8fb3f8814da5b38f24f0fcb05c431b446a282b48a3fdf69dacea13967bf18ab50cab89d6de865e02b66775f02ca0c907143bbfe530fc0aad13b514b398a21b2643f4e2a969de2d39301d9", @typed={0x8, 0x69, @fd=r0}, @typed={0x20, 0x6d, @str='trusted.overlay.redirect\x00'}, @generic="1b046392f6e5e0b366c62f0b678caa99af089e040905e406c6d074359dea0fe59768dfcebe01dac8cd248b4777655a14148b4b3512eec298a47cc035a0e1121897fab4b5e2b407b4f8dd6ac28e7f3c423db437c358d9efaefc9b65840040214a", @generic="49bfffffed3d87f1319e2d6604f59e1bb53c8266e001d8eaa0b6afef9ff03b5af2c98ac94c33e8ccab2cfde96881aaea64f79228bcd385b9132efaf2aa0a3b584db5d72428a3c0de1c4d8a579d4801aedfc1441059cbbed3a6e481c9d57e63bff4ddf85acce2081f4ca4e205d4d1882c38802798109547e8dd743633e401b8af4749110f1445e13b2d6d3f3d4f28890c95943bc08876091a331eae5300dea60a6b680cbe375fb716b20fe9", @generic="a47708473c955ed7690b29cffa4a22fbb164e928e16d80b5fa4e2956de12f862512b8bff2c587f", @generic="3ff044d4fe26ad7d7ecf0610e24630fe27d8f6518826f194d8912587689eb7efe6384d6c3fc635b7307cc1ec896c2c124465b021b2f9529370878d9ead611119c9c648c7c363"]}, @typed={0x4, 0x28, @binary}, @nested={0x10, 0x85, [@typed={0x4, 0x83}, @typed={0x8, 0x1c, @pid=r2}]}, @generic="26f2ae3ce168eb0c2332add629488cab910cfc6fccccf842ef99fc8321d3dce9c38fa42af6d2488a4add89e35c6e28247b000cc2cedc101f8065aa8d6de5", @nested={0x210, 0x89, [@generic="b6811999871bd81b619a00f23cbdab9ce7a8ee3369b974aba4d0cbd6e2af82cf507cd2883b530aee684a06a1ee48adc728230a0bcdcdedb535616c8e32193a9d54ed7cf4cbf65305fe14193a9a0386f23b481c42ba2474ae7483d301a7f50a5ffda9566c8d89848abe72d8ee2fcec35673e2e71c476439c13661", @generic="e061af2e7595b91ad921517262566bd1ec59902f215ddb4faf9c3eba3800269f1bf1a4cf5b4141ccca3dc2b4ce33e37bf2b45eeedba3b9d8f68e71f843b8be1a9a797eecf76863fbf43efe25f29b7a685a1dab5199b1cbc763", @generic="72dd70a5b799f89e899c745d2dceb24d58f15e", @generic="b647c7f16507588d1b0d28c8965395244d7b575598a93ee544d2e36b4980db4b2a040d1e629a36fa995f71f3ccb01064901eb07e6c9629ad52a4fe9daede02fb26b25551a310688b8a15005b9ce9d62521fd5b070cc37c1536c74576b1706d47a7dd913ca57ed88ce741bf9d9043b436a5a18f48fbe9c590ddba32ba32b9bea71a481f047e100492ccc753d1b0573bf89251bd04e2cdac4e62a2a3e17dada80ab88d416df80a4664217ecae12d24172c4ad5031f8389cc2d6c44ca1b47579d42c99a20e4673360a2cee83c36d29b6bd9ecac5a1a6aee8f260b33e5cd24eb2cdfdf2e0daa62b68e65c68bc39ffd8b8223e3f319", @generic="f330b8509594382ca8a4e322495ab2fc3d2d953038f5794faf0d9318c3ebaf2f2078e025d0a7fe8bd241fa6bc0da9e8de865d8"]}]}, 0x774}, {&(0x7f0000000740)={0x150, 0x3e, 0x100, 0x70bd27, 0x25dfdbfe, "", [@generic="80ec3cf7cef56ff6694cd9b095b2bfcc35e48b97d7cf37ad08578bcc8bc9eda45278d4796c0673e04ce8fd28f72bc4c056f3ed8141b1da4def511d4e8fc2b2b45e7134ad86099de2", @generic="971aa840d21bf2fa16cef5bff8050220b55cc8d2b0bb6183c30e321497e7455ea5093639ee5e4b623697057c31aa0a6792f146daa7fd7aa1ef18ccc23d61fd3f73f18d71f1b7eb6141c02a66a15ec14cce937662cf28515d6cfb9726054ddc0d55c4c7c43bd7e0d728e22f70e9e512520450f5acc3d032ebf151bb34541d4c743f648b277c3900e164641c716b030efb6fbb7dc3a6be917023de8fc19905512ef1d423d592cce68aca8e892d2e523850178aa6fecb312fda7a7340e3775eeb9e8729152f7f17323995e92cd40eea2094a1a1fbb9185950f2b3606d23ccd155d2e22124732b89964ab7e5b6864f2b77ed0b4759c5fabbf0"]}, 0x150}, {&(0x7f00000024c0)={0x3e4, 0x39, 0x800, 0x70bd2d, 0x25dfdbfb, "", [@nested={0x1bc, 0x30, [@generic="27007cbd688c4fc5f229c839c0a281df8f22f0e2aeb4117b458d22d32749", @typed={0x8, 0x16, @u32=0xffffffff}, @generic="e47c465f78709e768483b2b4127082a199f0130ad376440f1d8af3014d7945cf0f056a4fc3bcd10ba0f85ea209105388152fe75624d47e78f13c77b60c9812d197e7e79523ccbe871f08e81e9b36b7dc45f0bb5689266c53ccc9c456f1037aee79e57f3c9c36d964f892724e6a8b15af51362b69749fdaf1fbea7f700fac6c8c", @generic="e7e2db116cadad63728a627c831b", @generic="8c512bd9903a76c25b5ef9f50ecbc192bdc0b25c9161895a7cb9eb144ea94fc842af480cc1c286229d35d354eaaf0d10a01d45d9c79ea8e429bb2b52edb712d6ffa88bee8de93cdfcaa817e6eda9f38c46aa0cdec7996c", @generic="a1ee6adcb71a1ba66f0a0568c7cfd3ad753982859d3bb98da08d116c89bbde472cc10edc136108b942ba687e9a81a9d26987a3baa66fd2a6260071a14e023361102d156eab7485fdab3057032ff6a78641fe937dc1d99cff7c7cf3932b8f82ced574cfd75ad82295be75738149a94801d7169d91bf4eccecf594a42a35c0ee1708c7cb863b44036172b144cfba557ddb75fac2a33b7c5e2062aa24e6dbd02b43008ad99080737209584b6d8e11"]}, @generic="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", @nested={0xb4, 0x72, [@typed={0x8, 0x75, @pid=r3}, @typed={0x8, 0x1b, @fd=r0}, @typed={0x8, 0x35, @str='\x00'}, @generic="a2f95a38737708357848327563bb0c4ba6cf0dc9734e701912383c4a097073bff48d81e593aad9e505fc92511fb442f8fb46e484b5fe534ad5631767f7fd6cce0a37694a76b51f2aaebbed63ee817b6472b18a82d7c702f3887cec30a1e70bc98f1b19d5c237252aa4abaff0899c4f45b4036e5631a1307d0ee43dbc855e30393563c44ecc745279349244138f3eb3f9b0932a392eec7a"]}, @generic="5ab021e0e3461d06ca5d9704763f8b8a7b73c193a7de2f8351462cad206e39ec116cb46d9a5ee54a60fb8679a95bfcad05c316d999184aa6cff708eb83965fcd598ce7132a1fb63eb2e46fcb994839fea704f99cfff5afd65d76a52f9c3a6310d547eee9f046"]}, 0x3e4}], 0x5, &(0x7f0000002ac0)=[@cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}, @cred={{0x1c, 0x1, 0x2, {r7, r8, r9}}}, @rights={{0x18, 0x1, 0x1, [r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {r10, r11, r12}}}], 0x78, 0x4008080}, 0x0) poll(&(0x7f0000000440)=[{r0, 0x4}], 0x1, 0x3f16) umount2(&(0x7f00000001c0)='../file0\x00', 0x2) symlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000000)='./file1\x00') mount(&(0x7f0000000180)=ANY=[@ANYBLOB="090065763b6c4f6f70cbba"], &(0x7f0000000200)='./file0\x00', &(0x7f00000002c0)='squashfs\x00', 0x4040, &(0x7f0000000300)='$\x00') stat(&(0x7f0000000a40)='./file1/file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:31 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000953a76eb3c49c25b72c2581618728e9653de08c76580940bbc9aa7f88bf7feb5b4998eeaaa0b21a4249df44e43424890fe45ba483eb1d42befdd57f04c3b80b96f5173c92b1f221edbc3cb32bd0824c55be6e03943a15df4ab7437e06db845b8fe019b723efc685f4e23c5ee8bbbd09e93cebe17ee4061dff86f9479ba39d372593fb1c2690d76b450a294b10ee78d3bf227"], 0x98}}, 0x0) 00:17:31 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200b80000000000000000000000000100000000000000000a8bb7b4631475eae29b8f6aef550cc56fd6e79055e04426cee0a04ba72062ec46bd760609bf3521d978470550d3306a84e33678d01dbea2ca534bf582adbb35ddb41d48"], 0x98}}, 0x0) 00:17:31 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:32 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030003130000000000000000000000050006000036202237999f1fc10000000000000000000000000d000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000680)={0x0, {0x2, 0x4e20, @loopback}, {0x2, 0x4e24, @empty}, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x21}}, 0x48, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000640)='teql0\x00', 0x8, 0x2, 0x400}) 00:17:32 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f00000000000000003030303030303030303030303030303034303030302c757365725f69643d03df4343b561bede5287baa6a02c2e224145d34fe14fb3b91a84c4e888886163b38e933f5b6a8f811cf032726599fbb2dc4cc2badfb9e40b755af7576e132918b5244c48a7c04aa219c2a2e232926a84c8f5b056f578b43a79ccf0e0138af2094029de86a4dbded1f4f87ad2c0cd21f3c6e59fc975cd777040793fba20695f1a154f8ff9bc2b2132", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) getresuid(&(0x7f0000000280)=0x0, &(0x7f00000002c0), &(0x7f0000000340)) getgroups(0x8, &(0x7f00000003c0)=[0xee01, 0xffffffffffffffff, 0x0, 0xee01, 0x0, 0xee01, 0xee01, 0xee01]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000400)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@remote}}, &(0x7f0000000600)=0xe8) mount$fuseblk(&(0x7f0000000080)='/dev/loop0\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)='fuseblk\x00', 0x210010, &(0x7f0000000640)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000001}}, {@blksize={'blksize'}}, {@allow_other='allow_other'}, {@allow_other='allow_other'}], [{@dont_hash='dont_hash'}, {@euid_lt={'euid<', r3}}]}}) 00:17:32 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000100)) r1 = socket$key(0xf, 0x3, 0x2) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) accept4$packet(r0, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x80800) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f00000001c0)={@loopback, @remote, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1ff, 0x2, 0xf5b, 0x100, 0xc8d, 0x1000040, r3}) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x144}}, 0x0) 00:17:32 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffff9c, 0x29, 0x2a, &(0x7f0000000140)={0x0, {{0xa, 0x4e22, 0xe89f040, @empty, 0xfffffffffffffffb}}}, 0x88) 00:17:33 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:33 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB="020d040b120000002dbd7000fddbdf250f001800ff046f00df538a28581a6f096e09d62d25a07678b8b08b1786df8136c1757c26e40000051bbe23de5193b7df2d4fa6f3b97b2461241f5a2f46d1c9483d63fb637b8aaebf680222463f2223f415b2cb1e1b07e06ed6f63500133b66e2e5c877c0011242d772528421202aadb7282b441076cff900010017004687563b"], 0x90}}, 0x24000004) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0xb, 0xa3, 0x0, 0x3f}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e22}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x60}}, 0x400000000000000) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/policy\x00', 0x0, 0x0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000002c0)=@ccm_128={{0x304}, "d114a4cd7c28127f", "3eb762e911fe6f0939cc14bf8eed7446", "049a3a12", "609271443f62086d"}, 0x28) r2 = getpid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000300)=r2) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000200)='/dev/full\x00', 0x2, 0x0) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000240)=""/55) 00:17:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x614002) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f0000000040)) 00:17:33 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:33 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030060030303030303030303034303030302c757365725f69643dbc3c8f7c502e04ad323db9e549cb221f26fcf558010f2774b01608eba8113ab151c782dd14335841762e1c1dd7145f997122c67e", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:33 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000040000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000090000000000000000000600000000000000000000000000000000000002000100000000000000050b00000000050005000b0000000a00000000000000ff02000000000000000000000000000100000000000000a453d1cccdcd00"], 0x98}}, 0x0) 00:17:33 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/user\x00', 0x2, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:34 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) ioctl$UI_SET_RELBIT(r0, 0x40045566, 0xf) sendmsg$key(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x2, 0x4, 0x4e0, 0x7, 0x19, 0x0, 0x70bd2c, 0x25dfdbfe, [@sadb_spirange={0x2, 0x10, 0x4d4, 0x4d5}, @sadb_address={0x3, 0x17, 0x3c, 0xa0, 0x0, @in={0x2, 0x4e20, @multicast2}}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e22}, @sadb_x_nat_t_type={0x1, 0x14, 0xfffffffffffffffe}, @sadb_spirange={0x2, 0x10, 0x4d6, 0x4d3}, @sadb_sa={0x2, 0x1, 0x4d2, 0x6, 0x4, 0xbb, 0x2, 0x1}, @sadb_key={0xa, 0x0, 0x220, 0x0, "7342c3082a0cb57277d59f2310afab260508212e5c43a29411a9223251256c269306e1e14d4fbdecd2a04dde5d10794d51dad9824e96b17455d437a9ea556f20c0d2b981"}, @sadb_sa={0x2, 0x1, 0x4d2, 0x17, 0x200, 0xe4, 0x1, 0x8039e24344a3a35e}]}, 0xc8}}, 0x40) r1 = dup2(r0, r0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000340)={0x28, 0x2, 0x0, {0x4, 0x40, 0x8000}}, 0x28) setsockopt$inet6_buf(r1, 0x29, 0x2d, &(0x7f00000001c0), 0x0) 00:17:34 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000100)='/dev/snd/timer\x00', 0x0, 0x404200) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x8000, 0x6f5f666c75e9ef42) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:34 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') ioctl$KDGETKEYCODE(r1, 0x4b4c, &(0x7f00000001c0)={0x7, 0x36b7}) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:34 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900040000000a0000000000000000000000000600000000000000000000000000000000000002000100678034daf2da1566ed43750d000000000000020b000000000500050000ff02000000000000000000000000000100000000000000"], 0x98}}, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x80002, 0x0) read$eventfd(r1, &(0x7f0000000140), 0x8) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000200)=0x6e) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000000)=0x6, 0x4) 00:17:34 executing program 5: lsetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='trusted.overlay.origin\x00', &(0x7f0000000140)='-\xf8vmnet0/userem1:bdev\']ppp0em1-)em0selfvmnet0mime_type-/!\x00', 0x3a, 0x2) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002b80)='memory.current\x00', 0x0, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000002bc0)=@ccm_128={{0xcfecf6116af1089d}, "68a5946daa483ec5", "f0f376b6afa2b31e35e317ada2a96a09", "4c72af3b", "f87da7e0c5df2280"}, 0x28) 00:17:34 executing program 1: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0x0, @remote}, &(0x7f0000000040)=0x10, 0x80000) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000200)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x1000)=nil, &(0x7f00009fe000/0x600000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000cfc000/0x1000)=nil, &(0x7f0000fac000/0x12000)=nil, &(0x7f0000b91000/0x3000)=nil, &(0x7f0000000140)="0933eda0f0b9a4f631f488f868b887040c574d7d8594b1cc49da288db0812d624b0629f43fa8c4eff7730faa68b0fd5e180bb2ff9373409aa11247d76cd0460e9555468f285a304f56571646f668be75c45a83cda0d88f457d00cdf0a3c3eff6b37463880750b63be91297dd79f8a8ee533e9ed07384a04dda5123a854c753341b5b2ae91f1fb02aa73136541dc29e576449c0273c965aabd81747e94df51269a0399d891899fd935c6cbb9dcfaed1bc50", 0xb1, r0}, 0x68) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:35 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:35 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000480)={{{@in=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast2}}, &(0x7f00000001c0)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000080)='security.capability\x00', &(0x7f0000000240)=@v3={0x3000000, [{0x1, 0x9}, {0x9, 0x7}], r1}, 0x18, 0x1) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:35 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x1ffffffffffffdbe, 0x0, 0xfffffffffffffffc, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:35 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) socket$key(0xf, 0x3, 0x2) 00:17:35 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = getuid() getgroups(0x1, &(0x7f0000000180)=[0xffffffffffffffff]) mount$fuse(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x4090, &(0x7f00000002c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6}}, {@blksize={'blksize', 0x3d, 0x1000}}], [{@smackfsdef={'smackfsdef', 0x3d, '!security.nodev'}}, {@smackfsdef={'smackfsdef', 0x3d, 'trusted.overlay.redirect\x00'}}, {@context={'context', 0x3d, 'root'}}]}}) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 00:17:35 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000240)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000280)) r1 = socket$key(0xf, 0x3, 0x2) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a000000000000000000000000000000050009000000000000000600000000000000000000000000000000000002000100170000000000020b0000000005180500000000000a00000000000000ff0200000000000000000000000000010000d5ce62d687868757349b00"/146], 0x98}}, 0x0) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x20040, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x2) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000200)) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') setsockopt$inet_udp_int(r2, 0x11, 0x0, &(0x7f0000000340)=0x8000, 0x4) sendmsg$NBD_CMD_RECONFIGURE(r3, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="ac000000", @ANYRES16=r4, @ANYBLOB="08082cbd7000fedbdf25030000000c000600030000000000000008000100000000002c00070008000100", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="fc91c55a80000100ad0365ead76cdfbb524e4303a5f4f999dc99b721f72578a09d89817ccafdf02a99e0364e2d052129bacbcf229fc1a00c79820ec198d02c4fdbfcbc18ae41c05becb6fcd314f3433ad1c0647fe506fe830394bee32801c694e5e97746ac797c8783de9aa8dbbbe29cea218bd43e3c017e1945d0bb38a828d5e95b9f6cfe9c570bc605729c4e67017a303c7a6979690089f39aa06c1fd1521ea084e9c8250e811a66d771a6a1a303ee09d9d4f30f4ed7b7ce14f234", @ANYRES32=r2, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="3400070008000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r3], 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x1) 00:17:36 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) socket$inet6(0xa, 0x80000, 0xad87) 00:17:36 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300031300000000000000000000000500060000000000000010000000000000000000000000000000ffff00000000000000000000000005000900000000000a00000000000000000049dbb78f5a1851bac00000000600000000000000000000000000000000000000000000000000020b0000000005000500000000000a00000000000000ff0200"/149], 0x98}}, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f00000001c0)) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x6, 0x9}]}) rt_sigsuspend(&(0x7f0000000180)={0xffffffff}, 0x8) 00:17:36 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0f0103008900000040030000ffffff7f7302000006000000000000000000000088ae9640c7d1ffbbb8dd73ff7b780ea5097bacfea35bcac420afa10cc65ac1f4f85e49fdb8869fdb"], 0x48) setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x80000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000180)) 00:17:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) write$FUSE_DIRENT(r0, &(0x7f0000000480)={0x88, 0x0, 0x4, [{0x2, 0x9, 0x4, 0x100000001, 'em1['}, {0x3, 0xffffffffffffff74, 0x22, 0xd6, 'wlan0vmnet1md5sumvboxnet0cgroup!(!'}, {0x5, 0x0, 0x0, 0x3}]}, 0x88) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$setperm(0x5, r1, 0x20000) 00:17:36 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) [ 1041.298442] audit_printk_skb: 24 callbacks suppressed [ 1041.298456] audit: type=1400 audit(1560471456.667:5809): avc: denied { create } for pid=22759 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1041.457899] audit: type=1400 audit(1560471456.817:5810): avc: denied { write } for pid=22759 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:37 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) ioctl$EVIOCREVOKE(r0, 0x40044591, &(0x7f0000000080)=0x1) ioctl$UI_SET_PHYS(0xffffffffffffffff, 0x4008556c, &(0x7f0000000040)='syz1\x00') ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000000c0)) r1 = socket$key(0xf, 0x3, 0x2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) syz_open_procfs(r2, &(0x7f0000000140)='attr/current\x00') sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) 00:17:37 executing program 5: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x200000, 0x0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e21, 0x101, @remote, 0xff}, 0x1c) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") setxattr$trusted_overlay_redirect(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) connect(r1, &(0x7f00000000c0)=@isdn={0x22, 0x20, 0x5, 0x7, 0x8001}, 0x80) [ 1042.049398] audit: type=1400 audit(1560471457.417:5811): avc: denied { create } for pid=22759 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:37 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c438c02dc8a20ccbf7e4b3afa511ec2516f75705f69643d", @ANYRESDEC=0x0, @ANYBLOB="2c00ef26a39d07128011e8cb807b409bffbe86da1b87b0839b78df777da0bf96fb51f44652e0da8daa0b69b7c2f8c9bb1d9a765ffb82704d1423b0274ec5b91e48a616064327fdba1d2a4132b5c06b2927d982ccb073a4466d543f40a54ab676d4b11ad3083c7e6332f2efc4c10af06d213f7b4f51dda0f1402155a1a8d8fc78a1c6b3c52f095f3be7d9fbb8708c93d9e031eccd047d95ebf54f36cfa2938f07c619307ab719c891876a44d1970e8b7669032aa9877c7db06d2cae94e536816d1700"/203]) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x2, 0x0, 0x2}, 0x10) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000080)={0x3ff, 0x4}) 00:17:37 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/checkreqprot\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x880}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000002c0)=0xffffffffffffffff, 0x4) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="020300001b00000029bd70000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000020000005000900000000000a00000000000000f3ffffffff050000000000ef9e302c5be8080000000000000000000000000008001900000000000a004e2300007642fe800000000000000000000000000013fcffffff0a004e240000800100000000000000000000000000000000000879000007001900000000000a004e2400000008000000000000000000000000000000010001ffffff00"/223], 0xd8}}, 0x0) 00:17:37 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) write$P9_RCLUNK(r1, &(0x7f0000000000)={0xffffffb3, 0x79, 0xfffffffffffffffe}, 0x7) 00:17:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fremovexattr(r0, &(0x7f0000000140)=@known='security.apparmor\x00') prctl$PR_CAP_AMBIENT(0x2f, 0x3, 0x7) 00:17:38 executing program 5: prlimit64(0x0, 0x0, 0xfffffffffffffffd, 0x0) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000980)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = getpid() get_robust_list(r1, &(0x7f00000000c0)=&(0x7f0000000080)={&(0x7f0000000040)={&(0x7f0000000000)}}, &(0x7f0000000100)=0x18) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000009c0), &(0x7f0000000a00)=0xc) 00:17:38 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) [ 1042.965157] audit: type=1400 audit(1560471458.337:5812): avc: denied { create } for pid=22801 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1043.066129] audit: type=1400 audit(1560471458.437:5813): avc: denied { write } for pid=22801 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:38 executing program 3: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f00000001c0)) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67f464726f75705f697c3864e2c7c2fac9b1fac37b", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x7aba9990549acd7e) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1, {0x7, 0x1f, 0x3, 0x80000}}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:38 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c2dca5055e0bcfec7be070") unshare(0x22020500) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000980)={{{@in6=@initdev, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@empty}}, &(0x7f0000000a80)=0xe8) sendmmsg$sock(r0, &(0x7f0000003940)=[{{&(0x7f0000000000)=@un=@abs={0x1, 0x0, 0x4e24}, 0x80, &(0x7f0000000340)=[{&(0x7f00000000c0)="cd0daf74a2b4f90da8558f5334aae09d0ebd2a1bbabe527dd5f1d611dc594c752be8e94f57454e5f7595f67c9c51c9bbb63974eb8e9b7666aa9bdbe7ea62ee02bc45bf814003f8e7b4cc2a262a6f05e6426852c96cf3dbcd67e0db9804849a26cc014bc8db7376232f1d9e99c594743f93180b24d768f08a5ccae8f107e23e4c4896f74adad1bf27fb4aaee4b39eb8", 0x8f}, {&(0x7f0000000180)="1385c30a4f8398a634b48804401ee09a44f28eefd92d7ce418e4b1b7d346418f1a36e0c7fbde2e3146be73f13a5e8e58cf4391b41995b54d62cb1c796c6aaf4c88c61b794242bc44cb3731ba5783c364985a8c6dc02aa419d41d66fe4c14793d2c2894040bdd98e332b769c289b5da2fb63e2daa4b40e695ed80e1bc489a59922d5ef7c1a52dce", 0x87}, {&(0x7f0000000240)="9d3163673de9d0badad795804d14e0dea8ffb20f58f6dce427c78954287d7039c876b013389ae4beea2f42c69561f7152ec04024f096b9c8aeed4b2c10de0e993b67e3ec9c69112260317ff979908f427772d8e4718274849f1839193055a1733b6feaad439c3e0105d16844287e7d1adf18aa0e551a3448248ca273a380cbb3e00d9bd1497543ccbad6be36e18ac9f26f8d4ff931fdb4cfadc4dc3d0183fd7fe3121bbe8e5ae6a09b27349eeb4b1257111bf7217725ba6c8164188e565c5fe6a340bae993d6ae5bbd7350ee5f693c481a143c18a852392cfe2d9e6f060bc0da46f9901d7f0d8c5c8e6b264bc0c5", 0xee}], 0x3, &(0x7f0000000380)=[@timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0xffffffffffffffc1}}, @timestamping={{0x14, 0x1, 0x25, 0x10000}}], 0x48}}, {{&(0x7f0000000400)=@vsock={0x28, 0x0, 0x2711, @reserved}, 0x80, &(0x7f0000000740)=[{&(0x7f0000000480)="6f1530b0c3d52a642586bf7095bc4e6651c1699cc3d8272c44fe3151f1fbab51241199558e8eb20732aa9b96b5ba6d500e319f0b5c7ca8faf481a0", 0x3b}, {&(0x7f00000004c0)="1c05f1a9c785cce1b3ae55ea50a16c9bc3e804cc5bd2cbc9ed78afae27d13ec5052ba0e7b888cd9d7c3712df0366677cce1a6753149c754b1c74573fcea6f522e5f3dd39", 0x44}, {&(0x7f0000000540)="c095a32616bc22cd7709b41cfb7dc5904224e70b5b9f1dc2145751afd7997fbe098cb29169d33c19394f6840b76e6f953d408b14d8044113845c84d871a75c71660df6e994931dc44d5a321db2ec44c81bd75a1b531fef71921940d2ad9a446d23894a547d078323a546fd72b49b5e1d4c643079d56d08bc99a8bacd84de0d67a76a2ac6547940260e7389ffd4ae8a3d309554093e5bddd6940962e08eed9230c7e304c42831e8bbb384612c54c7d7", 0xaf}, {&(0x7f0000000600)="f3eec7971b77720207aaa05ffd021e22d5c991d08ece74a88443da798160a37634fb69cb2e496b4ed240faa93ff9935341a02d1f609ab47518633bcb7673fcdf42cd74d7199428bcf20bfe0ddd4b62974885354e68e25d05d190474bbea0e1408f1db6a6fe9a404fee269f6f0264a97b3d1760fd135832fe05954b159b859071d0da10e6ee1c32e45ebd5becb79322dfb42f94a4b82120202dce4eb57417482543d8735e868d529c54641a67bbf18cf7155b9e519fd383add7ce2d943adf95582835a08f5e943e9d6874986f07e08265f287d53553abfc53924d", 0xda}, {&(0x7f0000000700)="cbdaf859892f90c25a3a4a8b32510dda896acf055b15ff3523d02527e2ed1b4a219cee2fc48ad7e5f45998e12d48e060211dfd61fd2a67b657", 0x39}], 0x5, &(0x7f00000007c0)=[@txtime={{0x18, 0x1, 0x3d, 0x8584}}, @txtime={{0x18, 0x1, 0x3d, 0xfffffffffffffffc}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x100}}, @timestamping={{0x14, 0x1, 0x25, 0x1}}, @mark={{0x14, 0x1, 0x24, 0x1ff}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x82c}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0xd8}}, {{&(0x7f0000000ac0)=@xdp={0x2c, 0x2, r1, 0x2e}, 0x80, &(0x7f0000000d80)=[{&(0x7f0000000b40)="3f323bd85d5d9eed4ed4e23801c784b0de764e6aeb4d4bb2d2f76102b09637f4fe3b99da0614fd67698d6534acec4c5a94962cfd9606b94fe1dff7fe16730370fbbc13b32bd55dae68ac53436c47e99109dda997e4a6dd1fe3070445210e79cb8b1749d807812c04f400a4a0d8d1e1ee1d4d550fb56d673e1f96d6f561c5ea587b0570c73d11f8d47d31896eaae643accb0efa8b3b560a95c9a7fdad864e76376b33244f00825cbe3cff53349014ee86fd12ac311d5eaeec47fec86decdf12da1598b0f5f4fbb12e813dc834fb2584bf72bb39c5e0a733eef2d41394de19f2d9848482ffd609226b83a80c88", 0xec}, {&(0x7f0000000c40)="1c9ab435055583a6d1f5d92dbc16878aff459ca27de8306a4e64c16bce1f93c1580b9fccf04e", 0x26}, {&(0x7f0000000c80)="b9c447df184495f987f80a7626dd584ac0af43c499f81b6c42661ef6e0d8a444b3282d46753c09020093306d4d842c58bee443a079538b646d0f1446b1306ba9c40432e3b53c21fa78f8fadb7b4364390c9a9b2625d53d0e6f44386af835507ab96817edc51ca9544da4daa7ac09d181a5db8862ed762189a91ad8f47514e02568b7111ec6d31ce33c2aa33929a4caa204d1877f1279d54c6cbfde21a393cf00f176cb2d2ce99e1e17bf6ce67ca99100fa2187333cf23a27d94bbc811a1bde9f4acc5e64222bea0f9757b0935dc1d57bce52f6319140171d413b", 0xda}], 0x3, &(0x7f0000000dc0)=[@timestamping={{0x14, 0x1, 0x25, 0x9}}, @txtime={{0x18, 0x1, 0x3d, 0x947}}, @mark={{0x14, 0x1, 0x24, 0xffffffffffffff7f}}, @mark={{0x14, 0x1, 0x24, 0x1}}, @timestamping={{0x14, 0x1, 0x25, 0x7}}], 0x78}}, {{&(0x7f0000000e40)=@can, 0x80, &(0x7f0000003100)=[{&(0x7f0000000ec0)="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", 0x1000}, {&(0x7f0000001ec0)="9af69118085de48f8364959c2a2cc86d5cd4818653ccd49c33f1e266a10f8e2d6f154d5e2cf17872945a4edafab12caa0e1731864e521a9e386493f836cf41bfc24badce3928c1d838ab919233396491ef18665ebe811e92b1be6689d054e0396017f3be0cd7389793f56de1364be3d7e070e33bb8a04c40b091d8044f27d88f9f205ede93ab071eac54daa0627236d94ade30b4fdbd785901e81992d7f73a807d30b95aec1b7de346688fd48beb3e15778363a1dc91a929ee30e5148f42a250024f81cc513485914d6bade2580c8a25ab5dff714896d9520ff18ef2d478613edcf7bda9df7dd90a7454518b3788f37055d22f4963e52c17eb10ec5bc22d39d15d27787c4ef1f2e9dd0e9d94d3b61000d228fa8f3a21183c8477182d34ca2a292948b1fcba456a84cb4e81b29ed566e5edecd0d92aa78805a36a68dce46e11fc4d9409c6197075e5f707c7489d435b93feff91a7d31c1687d40f4d8f7c9f94f81e65c97fad8781bb3e5f6bfee1257c16dcc5dfedcddc89bc03fb8a490e0364184cbc7015605a8450147a3d1ddaccbb9b9d67a0969f1eb8adddec6a55ac8b791c74d7c4c9fbe12b01cd174db58bd53752df1ef75183c5f96d0dce569890c18394153afd93c32f0d9f1523c95b996842c2fa14aac64b5b7946e982729aeee0d044f63c93e6e185678ef7eabb2a1c92b43e974105a151e4b6e5097e488aa624f8633045f2c6ca6fa0a5afe6943e00003252ba544960c05099b3def633f47984c6ee05ab6b22e851d4d93fcfc17d29f776aa070066d08aefc007e6f68b3b01186b52422ee75c2b86f95f689cedfda22d4f6820865711a2ce04c181fd5f56557307f58990189a04b7ac9aec69ac78bc440cf0cca0eb1c4b8123b4ac21c60c0d6f52ec2b29240bde454f1e1651d685fa3aae72307d42bf687bf9bcb4a87273ec1b8b7de74a35d9bf60f7f0586f7f9d8f111c6835db36834b1974dcbf34a11e0a6b0e976ad2dc0429bb5d8d627aaf8de474996405f875b5331070be31ed28188371f7e1e258f23e72527a259ac323d40d25ba1a2327f091a45adf6977117c92225712316f519cf2bccec8fc4e9952d375e43a6fe793e6cf5773998fd595fa2480a35135a13b209b9445e2e71e8cd98b0003aa714c051db3b8c1a4e3cbcec196f58b3653a1c5aa454e63fa355b3782c3c3f489c02571774b41589de56f54f7af2bdbfead8f9902a60394b7e2d01f91330d6574d91e831f53bb1df331120496e043e66e36397e9ca662b505ee032ed364e273543fd8fc034eb3674af2897e2ebaf30c36fb0639445c2fdd60f0c37cf010b647ae8a7d78f209f6d6e8cc00a6fefc3c23093bcefe5ae30accd5b23b2b3382438781eb5d49bfaae1b2786089edc3bd90488ce520750ed510b76085396e0a02e53e0d954982ef925d2aff57120519d06087412ff2e7f1ec73cf5bac80c5c6086759aaf15067a31fb7b63cd5caa531e395f8784faae426aaff6513aeb29ef1948dc2664b494c026cf70e8bcb699027c86cd047a0ade0ecff39204f9bce86f9de28a9cace95a767fb29044904b3a3c228e8bc57ba05173841bbe1fd4dcb0492f8b05e2eb801d9f9c3f69d4896d803130ab8d354798589a507a58ff63300d381c0d8ba9076379f4f279622bdece58f6ad57d4dc6976dc0582ed5adc6b28f767cd0e7427557815e4be62a349fe2ed23d24684be3d381a9612f7c1a271d435ac1fba404914d6dcb91aa6652e8081d4023740f19673ad1482559eef30d08eb15f72bef73fbbbc62633576510973152dace1f71d71bcf4e07e5caef3541b58c692a3a9e17df0770a296b3c05e7ab1be122e3d17376f114c32d6bccdb14439e4f793215572e5c7d481f9a5abb6f23449cdab7740685a449a43c8b74be7133268f8d6534ed26eb6bc79e7190591889c7ac4b191b353adb3920319923caf101989d0677380c222c3f4eece78fb55570d2e2c628129c0293d0f422758d08d9856623b28f130e6245a07fa33d5ec84973c201c26a774b0f0d323be2e49d8b9058182367522dc9060eeb08e50b9987729236078626a8ace5f004f184044f7be11670017f56e0acf8985bbc3ae9cd14b5d383d8cc8d62a1af804d5479607c5c6b1c83b0a8661ab446d54ca917d108063a23590ddf1966ca2e3ac1f6a7bf6454b2fa37911ebc983eccfb3a6dd2885284dc201bffc58edfcceab8be75650c7509db9ae74614a52658f5614f5d83d74c7f5374cd8b1237c35de3137df357f5ab111bf55cb3a7dc9cb3141aedcb94cee89fbec9462ba85dc5bc2f55de53b88ae460b4c50a8c73538075e02b2ba1c35150da06c6cc3dcee90c308471d6237497e7f5c9042371d45bb5d5024ddd1df78e6c9b94a4eef74a7afbe45602f3806ba2777f18e44248faa1922115dda2daa2dd0ea2d5940cbce68f3aea21c014034126c77b85c05e3a9a7fd606da9ef1deea47fbedc378ef73148a0eb300721ee562428e5d0be8d4575a8d651c3226b7eca4a0f69f195702121a7de3677add430c0246a6b6cdedb2d08ab001a84085bb20428de999f494e85b646440577c0516d080c949f5f6b056c81e80cf29e1c09578900b72a48a5c6ee97e5596bccba376d2b221c77d50e2262cfed12e0218a076e029ce46b484312208949efa0d6f09fa6c2842c23dba168fd9ce513e42aca66007bef590cc0cd0a72d6f44c7f767f4ef580d902c651ea515456fe4403b8d02baf5becf5257180da0fd2849623a794bf219a86b4dddcfba347c5c7f6822cfc1ca91f2fcfb9009df918d6116d6cdfc4ffdd473c6a8ffa36d3112331e9c5c16600e01ebd0dc1cec58a22463ac1bd899aa9314537850d5722a9ba103289871f9a1f1c122c00bd7d1cdea96c1d1d9752a64619ad1412b87f8317b6a654846ea7666e629189cce194803f539f6325ce799447740249109cbaf649567b2441139efd7c151ba4edefec87989235681227eaa2e150ed80d67ddc10e0d16509809dd92174d8ea3bb2701a1a9ef0646649c5c3cda971d9f8d22f8afbcc241c52dddc709a977cdf47ac79e5dd6165567ae1e29fb6a1cc61433ff6b66f317bbd2959cbc59b65172305a0f80d9eb31287d3342244e0af611eb69e06e4c75c147dac4fc7655661786e8910b0ba716e5dcd9223b9778ad14831bd75cb056136b04e1e28bb6f928f1c126c4a1afc66faa00fb404f21ceec848398d2c6a5200fc9778019821e2676c78aa2c014e47a6121e51cfe0cef73ec225c649a4023bc1316e43753f2ef52cd3e0478dfe4001b04ed61f99f3267aa8b692750df1753d9a63e8fb8cd3936868b236188207ecc439ed7aaf1c0f811ab0dbd239348abe9e69dd0e4b0bc9e54a4621ab9afcfad8035c3212793340083bad6244fd44971f4ef547a7ab6470ddce2f8fad9ab8826178d971726a5068459cc207af7973e6fbd4fb49f34d637d8ffe990e2add286d88ac7d4dd95116952685fd0880494f7d85f62ff172ffaab355ac5c5eb1fdf321e659f6e7e56e5d4d26c8050d23fc8aacec52237efb32d1764e73ed9b5d279aba36880fd40db48a8daf2abe881fe515329bf54dcb51ae43b7bdd2389e24252eb29deb3c10cf2c0e254fb69189070f5ef9ee49faedd7e648420dcb13e7d15585f2a49034da178fb0e20ef3e50a1b2cb20de886e4d16218095fc48c8b98c54f82cfc03ac7ccba13cd4a5d2e0199f77d9d9f5f1f6de40dad38a32f1b39ccfdfe49e207cb7d13492b58a31c8b806fcebfbda56a5b2b02d866fd91e77eaa1ff3ceba362b9f8e48d70ac122ea62159391f6ab454d67b22ffc96bb73f73318e713445753c3837d8d7f5b6f8b6822dff9fbbba39649998d5ea2e2e1a46e580ad5e2cbfbbf8790952065d94960872355ce38aad022acd2162af4383c29cdb16f71dc7ba90482b9b388c57624c405f525a9fc9067816095c97b91370e56534a9fc5ab15960d303ab8504324d2660cae71a9acdac335975547408e6b6bd58a961819e780100fb45fa848ab6a0a01c998ac5c199ecb50f805c6f51825b86c51a183011c8776ccfa4f8184e1161cfb6cb354c3d2527bed21d1276f34bbbbef2cc49a8a34138edbd6f5218c45cd9df7aa5ded6f9337924c2dd90cdb66be6a8798495f70b74cadfdb72a9a0122726a241c90253c8501c02f73b603673463de649b43144bbc13fe981977553cdf08a63c8ea81eeb2047df05e23d508bc88b2544c5be448b84e8a68ba995cbafc7d622f9e01bba4fc327530b0e8ce83ccbca5a173ea6a30358e13d419b86539895549081c68fc90eeb4052a4e97e03b6d638f3a4b2af03508714fde03dedd3a2dca7cc34ec5043201eea831bf3603c2b5ffde8381258fd23a7a00cb98f9e4d2caeebb8829d9f934c16722cfc61e7cea38b8ce04885a723f983b44901e907d9d4a9a2a35797002992f621ba12c2480ad33324ddcacda54178f8f11519d85de1f68b32d0fb95ce4d9189931d6d15d1d2f9629e1fabc2be35ceb5292a46dc62a3145b17a0798b8d537aad794a96749c0bfc192bd23eb0a828ea8c17d1806a3b82cd8af1ae3b829ced0bc949a35da7876b52ea07bbc557c8750cd97a29e6d16f4099a7212e41d0561e033b429e10d6d498a416c5780a688a2bbe0e7d6d8eaa9cc5bf379ced3479444a34f9f4367ab95da6402f40c897b4df76dc5332942638570b731245b45bc79298ff0c2abb3779cb3c8685ce5c3a8ce72625ec0aaa1abc88809204995e6f5b781725de87d2b99b95b94164eb1576440d016fb7bf86bfb625709429b040f64dab511089fb45b997a2836b1bb80906a226d5d4b88c3eea4d7a985e08158ada794f5efe53cc26bc7f1fae6061f7186b81bdd8352199a2d1ccce1a7e637c9fd9346f1a5f5d807a224ca357cb3a1384021b1e8e6ff2143644e5f620ed1226173ef2057c0b4cf7f4f351819ab77936d0db002d27112f48258a42c903a120780f5623352808347bb657bfee3aa75801b8c68b3fd6d54fe930453b70d5bb1680e994aa8dc6b0bfceacd144be040a2315f178879d9ff658f89c4ff20e8a8558d57d574fd3ba97242248865398e2d40e379a7a0a1c1e2de7a2a664cd456b045ca8b83c463726e95d3f15b89794b55c5c5eb08d160e7b70170bc97e3fef3e5ea6056cdc060d1becb01a64602db9dc46cd1d54f395510bd83577eb73a77b555012d7fce556e556e4cf3ba8225a89a5f84bf04dad33667306ae5075b64abc4c5d5c1a79a5fb24f9feb74e9604b98b61a5fb53b5258058589e03a682532a2688017ded6b1b0234a17491bc37088cf0d96401fff0e4e4438e750c5211dd51438825fa5a3266995dcea0a44cb54b5c15c2764f3023c21468f3ed316eb292ba62f295bf087b4443deba744e9a8fb4e1377cfed6e8bf9a3cd37842c8815f170cc77b9efbd151841564a959400c4633c75d61649d04aac52fb4d094014e0929f5a4328a052c796ad0281f596075c38d3965e971c9d4b310c661f53566bacdc0555d53fcf9499339d1603375644d7682cbd62f6d9f7e9d21ab7ce96f2f54309cc7293cfe9c71692c963e500802e0bf653ed3f1db2e6f0279cc7d1b32ff795654aaeb1baa91aa5fa9155a9c418e710a015c040da1386190cdb30c94b1be3e0e4c2a2a2f9b564c4a02d0d178d29949601a05bd8193c976e40d41e8196a00c0a67473254ee1799cda6a244341e231230e80ecffb3ea1d02c5b4147182e04a471e7209769435e2ef0958312eb8416dab810f46023e3ca9430a9652c24ebc9884ef65bb12148f24fe27a1afb8dec54", 0x1000}, {&(0x7f0000002ec0)="098a77ee4d5dcac51b13c85c8a17596990cdb0e81ec9c6ace0a57cd150fc7a5c908205b8a9bbde304aaa6fd6f32a0cafefe0f110ff2b3695dae8d22b4f4138c027e59577712eac22ac7616", 0x4b}, {&(0x7f0000002f40)="09d7881566b78331cd5dcf556040d9167ea9425aa0d3b2626fb6338a46c37bab9458caa99e85e83d69b58b0f36668720521ede960377809423775a790caa35d57ff39f08a52b3a6953d96dacee944cc12ae2c060670eca8bb4fef53dcb9be5a74bd07956b0da46bb65c4af298dcd8a5a8f2f10e192d9ad1c73a0dd09749e042b6e9594d295d0ff496b8c0e91e604a3ed05bd7fd7b2c9f89a80489b089cccbf7e00ebb25ce13ac2a145e1ccb0446e068cf8d6c569476267f15d31bf53e2ddb175c9ad5f410cd794f084345af7fed2a1556b0f2aecf414dc2106e7f26fe34fe7", 0xdf}, {&(0x7f0000003040)="02c0ac61a93170236e3552b4c09b265bc366afdf7f8b25da62126cfeb46532a98d9e9e85348747ee79f60cab6a8b43464c5e2caf88cede1f591c5ea055baa91d03858340267af91db9b57fdccbd7e368ee2941ba22336f761cab628dd233fd5773b3d6d20c19c8c18e5eb063ef0c3dabb101fe7f22233b6d903c43e08990caf755532f50d6e11d7d61da3d4bc9f19d9fbeb87362c037e3028c80dcbcc41fbfdaddc19c3bf4", 0xa5}], 0x5}}, {{0x0, 0x0, &(0x7f00000034c0)=[{&(0x7f0000003180)="8615cc8355d4ada856195646bcd7dc01e783d2c76021d1682dbc3bae56b396c5605580a1468b751dd131e21aff4e46e47b10f440091a575ffb34980075f37106f0e25dd77d5a80aea7c04cc67b73260377133c8ca6942f5343cdb789fadef4f92aa04d190525a377f5d9dad54f92201b3d0e92810ce5afa12f610640d5effec1aa8cb03c34048dece2ff4c62", 0x8c}, {&(0x7f0000003240)="97c2c4f5d313fd474b794f7abec5d6eeaf9ccf163a9f093e2dfc05aa43c7298b7307d787d248df3941e559c9495eeed6b2ce0bf4243d092a4701b83c7438a4c77743f9e3c5c118b982b0ef810bc3f17c1cf707", 0x53}, {&(0x7f00000032c0)="f526e2b346985007a79eb9f65e4968485c3d5ca02aec6e12c2e764dd173d9d70e1391cd018cb707e0231036105086b8bfbffe712a9f2c3f3aa6b29c312669328c7309bf3e1ba30eb224e7b6cac26f9f7f7", 0x51}, {&(0x7f0000003340)="37f591438c1bd03e0a4004229bf4057b6fd5760ae99176315e78f1aa122a80f7134d5a576277caf07cd0bc64595d28edc316529296aab3782b8cff76e76065183abba786930127a835e558ea544716938c93c593b7cdb036743a0f7e41dc22dc6633a75a0113f4ec2ed31fc00812236c7f376d2da826d5ecc27419fa4c6ae75e6c28197919dd4c0f2d334a39f8bfb8cd0b332b5bcbed8a1701b481c3dc8e5fce48a7b56b444f3203863f3024edc742508e0fdb282192d1d6a0243e91d5364d5cac63510586846991d9c637918a17608f0fa00819754fb998da", 0xd9}, {&(0x7f0000003440)="47b3453698d959ce2e6521109fb1ba6d8a7a220b4e1783ff368bf5ba8d09bce65818077c115f1c0b296d186c0a4be4b16b5a26f4bc3a81122049dff0fde51dc6bed6e9589175cbfdd875188bfee1cec6", 0x50}], 0x5, &(0x7f0000003540)=[@timestamping={{0x14, 0x1, 0x25, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x7}}, @txtime={{0x18}}, @txtime={{0x18, 0x1, 0x3d, 0xce}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3e5}}], 0x90}}, {{0x0, 0x0, &(0x7f0000003840)=[{&(0x7f0000003600)="42b3434b2c8c08b805bdbd92944cb86afeef83e3282cae1b81048a0729ba7ab4ef5b55f02309314b22a2517539dc7a3f9dc35fc0394177ab99351a5ba1af3f30e89aee1ad34b091b598c9717c73de88651c8715f1baba9f6bedb11f6f859522e6b384092cb4dd5b216d12ea1eddac447cf02", 0x72}, {&(0x7f0000003680)="f02b7a91fa8c41", 0x7}, {&(0x7f00000036c0)="17cbccfdb95859fff7f0271ec58cff", 0xf}, {&(0x7f0000003700)="8fb5fe730c11fd96a6a81af46472d2260c2a128d59da747c5383fdf49a5bb10d3acb4e156166c4aae36476b6729440efc8fb50e12b4c44fa8427f62d9b56feffdba6022402f3cd2fdbd71d94696dc9c63fce2a8c114db49d5e2772b4566cf80fd1b56d9f5a5d8e54a4c8b82ff1c5caf0a8dd698c8d9847109db587", 0x7b}, {&(0x7f0000003780)="8967472fb321a396f14a7bef1b0b86f6cb957fe69730838411934bf407d8e51ed31117491906759bc7f6d61a7c013852619f03dc9a7be1c70bacc1dd5040f99a9477ff2e7bad98dec1e80ac30c52d7bc296274a4d892c305aa0ab3c83fc918195b408ea4c0c9387b7dd8ebbdf11506d511b1b7619e7a20694558de09ba7463e508d6849908ed84b4cae47b3f20790dc38849db5dfea52878", 0x98}], 0x5, &(0x7f00000038c0)=[@timestamping={{0x14, 0x1, 0x25, 0x1000000000000000}}, @txtime={{0x18, 0x1, 0x3d, 0x8}}, @txtime={{0x18, 0x1, 0x3d, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x800}}], 0x60}}], 0x6, 0x800) [ 1043.488055] audit: type=1400 audit(1560471458.857:5814): avc: denied { read } for pid=22801 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:38 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300031300000000000000edffffff04000600000000000a0000000000000000000000000000000000fffd00000000000000000000000005000900000000000a00000000000000000000000006071800000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff020000000000000000000000000001000000000000"], 0x98}}, 0x0) accept(r0, &(0x7f0000000000)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) r2 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000300)=0x14) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000340)={0x0, @remote, @initdev}, &(0x7f0000000380)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'ip6tnl0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000002640)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@empty}}, &(0x7f0000002740)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002780)={{{@in, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000002880)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f00000028c0)={0x0, @loopback, @multicast2}, &(0x7f0000002900)=0xc) accept4$packet(0xffffffffffffffff, &(0x7f0000002940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002980)=0x14, 0x80000) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000002a80)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@empty}}, &(0x7f0000002b80)=0xe8) getsockname$packet(0xffffffffffffffff, &(0x7f0000002bc0)={0x11, 0x0, 0x0}, &(0x7f0000002c00)=0x14) recvmsg(r0, &(0x7f0000002dc0)={&(0x7f0000002c40)=@can={0x1d, 0x0}, 0x80, &(0x7f0000002d40)=[{&(0x7f0000002cc0)=""/39, 0x27}, {&(0x7f0000002d00)=""/1, 0x1}], 0x2, &(0x7f0000002d80)=""/44, 0x2c}, 0x40002041) getsockname$packet(0xffffffffffffffff, &(0x7f0000003280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000032c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000003300)={{{@in6=@local, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000003400)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000003440)={@loopback, 0x0}, &(0x7f0000003480)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000003580)={0x11, 0x0, 0x0}, &(0x7f00000035c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000003d00)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000003cc0)={&(0x7f0000003600)={0x6a0, r2, 0x10, 0x70bd2a, 0x25dfdbfb, {}, [{{0x8, 0x1, r3}, {0xf4, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5d}}}]}}, {{0x8, 0x1, r5}, {0x254, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x36e}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r7}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}]}}, {{0x8, 0x1, r9}, {0x3c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r10}}}]}}, {{0x8, 0x1, r11}, {0x1d8, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r13}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x67}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x2, 0xffff, 0x7fffffff, 0xfffffffffffffff9}, {0x7, 0x4, 0x400, 0x9}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r14}, {0x78, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x97}}}]}}, {{0x8, 0x1, r16}, {0x88, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}]}}]}, 0x6a0}}, 0x40081) 00:17:38 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x6, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x43}}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/llc\x00') ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000040)) [ 1043.719733] audit: type=1400 audit(1560471459.087:5815): avc: denied { create } for pid=22801 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:39 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200000, 0x0) setsockopt$inet_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) 00:17:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) write$FUSE_BMAP(r0, &(0x7f0000000700)={0x18, 0xffffffffffffffda, 0x4, {0x101}}, 0x18) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340)='/selinux/enforce\x00', 0x40100, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0xa4100, 0x0) rename(&(0x7f00000003c0)='./file0\x00', &(0x7f00000006c0)='./file0\x00') write$P9_RREAD(r1, &(0x7f0000000580)={0x103, 0x75, 0x2, {0xf8, "5db101c58870c1e4072b6aaf78a9db246275ed48a852ba8f28165d26908b41e0fc44a27e191a4262421c881cfe13d00679d147059e4c1b7928aa0ada80d8d127b809169373183d84b54903c3f71dde27ac9afc9ccddf873056c96efe02e4621280430067285534637353ee0a1e5e847e7bafc51780539e6838b56ea3f88734d9927bbd42ed7d6ed7419adc2a580ec1deb873c4c4abb2cf65452d1c452391c8a4f514e5aa0fb3f3d38e7185f68d212f62430396c86f809e97c43dd7970a13520f55e14c9b7e819062e1f450d1a714adb0fbb66fd157e4489889919f2f21550e915b22be2371e87b65e86c534e24186f9f0944714af7a9f950"}}, 0x103) getsockopt$EBT_SO_GET_INIT_ENTRIES(r1, 0x0, 0x83, &(0x7f0000000240)={'filter\x00', 0x0, 0x4, 0xf9, [], 0x2, &(0x7f00000001c0)=[{}, {}], &(0x7f0000000480)=""/249}, &(0x7f00000002c0)=0x78) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000080)="c0dca5055e0bcfec7be070") r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_CONNECT(r3, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, r4, 0x8, 0x70bd25, 0x25dfdbfe, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffffffff}]}, 0x20}, 0x1, 0x0, 0x0, 0x44000}, 0x44041) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000440)={'nr0\x01\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c40)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb96\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\x97\x80\xe9\xa1S\f\xc7?\xa6\x95I\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~\xff\xff\x00\x00#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xd5\x1b\xca\xa9\xc7[\xa2\xef\xacM\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xb4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\x04R\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xafh_\x9c\x91\xc1q_|L\x11\x03\x94\xc0\t=\x17\x95P\xd7\xcdH\x1c8^ARL\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x13\x82Rk\x9cAz\xab\rT\xadLO\f\x17Y\x1dg\x10\xe3LL\x1fC\xfa\xd9\xb0\xfb\xb4\xf3[\xdf\xd0\xd6\x82\xf6~0\xb8\xf4\xb0X\xfew\xbdY\n\xd6\x105\x9c\xb7\xe5F\xc1:9\xb8\xc2\x85\b\xfd\x92\xb0k\x93\xd7\xc40J\xc2\xf0=p\xd6\xe3\xe4W:\xd2\xf6\xfc\x83\xb1\xcb\xd1K\xb9(\"9(~\xf4\xf4\x94`\xe8\xdb\x17\xf9\xcf#)T\xcdj^\xa61\x12\x91 \xd7\x92\xc0\xd0s\xa9\xe4\x18:') [ 1044.272640] audit: type=1400 audit(1560471459.637:5816): avc: denied { create } for pid=22835 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:39 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = getpgid(0x0) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000340)=r1) pipe2(&(0x7f0000000440)={0xffffffffffffffff}, 0x80000) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000004c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r2, &(0x7f0000000700)={&(0x7f0000000480), 0xc, &(0x7f00000006c0)={&(0x7f0000000500)={0x1b8, r3, 0x404, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3ff}]}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_MEDIA={0x30, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'ip6tnl0\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf4d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'dummy0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x9, @ipv4={[], [], @empty}, 0x1000}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast2}}}}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_LINK={0x20, 0x4, [@TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}]}, @TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_MEDIA={0x18, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x1}, 0x40004) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x12, 0x80000001, 0x6, 0x3b, 0x0, 0x70bd26, 0x25dfdbfe, [@sadb_x_sec_ctx={0x17, 0x18, 0xfe82, 0x800, 0xac, "d0e27d26a939004c82486f0b35640e28f4be5fedec55ee20449859b0f8b0712f5538c4ada63d470dc2173830e1917530c34e4442cd86e6d9abe0aaa3185a8646251d1886c0f6c916786ae0bf4beb47097b4aed59cb70b1a8ce591eba6eeafe1d704337847b4b52e770d0a91642926744e09dbbc7402a531c99d7ab5250d9fa128dad82bc84f766dbc7a2ca6fdc4eed02f1a10c1e1f35cfdfb507e701901de8301a7932cf66f66f5eff88f15b"}, @sadb_ident={0x2, 0xb, 0x0, 0x0, 0x1847}, @sadb_x_filter={0x5, 0x1a, @in6=@remote, @in6=@mcast1, 0x3, 0x4}, @sadb_x_filter={0x5, 0x1a, @in=@multicast2, @in6=@mcast1, 0x1, 0x4, 0x14}, @sadb_x_nat_t_port={0x1, 0x16, 0x4e20}, @sadb_x_policy={0x8, 0x12, 0x0, 0x7, 0x0, 0x6e6bbb, 0x80000000, {0x6, 0xff, 0x9, 0x3f, 0x0, 0x2, 0x0, @in=@multicast1, @in=@empty}}, @sadb_x_nat_t_type={0x1, 0x14, 0x3}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e22}, @sadb_key={0xb, 0x8, 0x248, 0x0, "ab8941aa135b6957380de28e9d49d467143b8770a5232e20549d9497e858e7f0f2ccbbf6510e208f42e2d46cb14fc3fff138318328f972bc21f7e7fc5e3f1e71ce938f92d55f257e16"}]}, 0x1d8}}, 0x80) ioprio_get$pid(0x1, r1) 00:17:39 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) [ 1044.491708] audit: type=1400 audit(1560471459.857:5817): avc: denied { write } for pid=22835 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1045.017412] audit: type=1400 audit(1560471460.387:5818): avc: denied { read } for pid=22835 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:40 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x10000, 0x80) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000040)={0x2, 0x2, 0x1000, 0x0, 0x9, 0x6}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a00000000000000000000000006000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:40 executing program 4: syz_genetlink_get_family_id$tipc(&(0x7f0000000000)='TIPC\x00') rt_sigreturn() r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:40 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_INTERRUPT(r0, &(0x7f0000000080)={0x10, 0x0, 0x2}, 0x10) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000240)) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000580)={{{@in=@broadcast, @in=@remote, 0x4e21, 0xffff, 0x4e23, 0x9, 0x2, 0x20, 0x80, 0xaf, 0x0, r2}, {0x3, 0x0, 0x52, 0x43, 0x2, 0x5, 0xb42, 0x6}, {0x7fffffff, 0x4, 0xd, 0x8}, 0x8, 0x6e6bbb, 0x2, 0x0, 0x1, 0x3}, {{@in=@local, 0x4d5, 0x3f}, 0x2, @in6=@empty, 0x4350b, 0x5, 0x3, 0x5, 0x1f, 0x8e, 0x3}}, 0xe8) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:41 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000200)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000080)={0x0, 0x200000022d}) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400002, 0x0) ioctl$ASHMEM_GET_SIZE(r1, 0x7704, 0x0) 00:17:41 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f0000000000)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000040)='TRUE', 0x4, 0x1) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xa3, 0x4, 0x9, "9813a31f6799e60a1074fbe6381f5c50", "401f7dcc69b2a70fed77f9781de49a5ef1e708935ce20aeea8f667cbc8ca8ddc49af6e7ab5bbe2afd87c6ba0500d0a8d7caff123557456c2d4b00123fb755d05217aa3969b8a647f51d21ce4e95d46ba2445f17e55bb041a6d348fd0ef2cbbadce6917ff6624e6a6b6e3f4a590e3a85831ff18c9b9e1bd11c84835f2920de30d7ef676e2065604bdb3373715550e"}, 0xa3, 0x2) 00:17:41 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r1, 0xc018620c, &(0x7f0000000040)={0x1}) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) 00:17:41 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:41 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) ioctl$TIOCCONS(r1, 0x541d) 00:17:41 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) recvmsg(r1, 0x0, 0x40000003) getsockopt$inet6_int(r1, 0x29, 0xdf, &(0x7f00000001c0), &(0x7f0000000240)=0x4) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$BLKRESETZONE(r1, 0x40101283, &(0x7f0000000280)={0x0, 0xff}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_FLUSH(r0, 0x0, 0x21, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) dup2(r0, r0) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000040)={r1, r2/1000+10000}, 0x10) 00:17:42 executing program 0: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000040)=ANY=[], 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:42 executing program 4: r0 = syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x200000000006, 0x100) r1 = socket$key(0xf, 0x3, 0x2) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000140)={0x0, 0xfb, 0x71, 0x4, 0x400, "d6baeab4206113f757e40f54c8ff569b", "8e93d6b41e648f4fd41887ece736f04a07ea17579b91904f046bb02db95c16976bd3af413fade0acc2b5e7709867a2daa59791186b00bcd35eaa67d5d297e6d5b2cfc1d7fe4d86d1b8229f4369f29c2287310b3b8847d9f3e0f0914d"}, 0x71, 0x3) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/mls\x00', 0x0, 0x0) ioctl$FIONREAD(r2, 0x541b, &(0x7f0000000240)) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/commit_pending_bools\x00', 0x1, 0x0) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:42 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x3, 0x306, &(0x7f0000001fd8)=@raw=[@call], &(0x7f0000000000)='PL \x00L\xf7\xd1*\xf1\x1c\xe9%7\xb5\xe3\x19\x1ef\xde]N\xc1\x8eL-\xf0\x14\x84\xa8mw\x84/bIF\xea\xe3\x10yL\x8c\x96\xff\x14f#.%\x95\x119\xbd\xa5\xd2\x99\x0eR?\x8e\xc3\b\x0f\xfc\x12$\xd8\xdcL\x84\xa9\xc8\xe8\xab1Wh\x06qU#\xfat\x9e\x86\x15\xc6\x10I\xb8\xb1\xbej\xa7t\a\x02\xccZ\xdd', 0x5, 0xc3, &(0x7f000000cf3d)=""/195}, 0x48) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000100)) arch_prctl$ARCH_GET_CPUID(0x1011) 00:17:42 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000180)=ANY=[@ANYBLOB="0203fcfd1858fbfb7e87caa52d17e50b3600031301000020708bfd0e3b012e4e8337155ac269c20000000000000005000600000000000a0000000000000000000000000000000000ffff0400000000000005000900000000000a000000000000000000000000060000000000000000000000dd0000000200010000008b6272138d6f34d5d85bacd5faaa00000000020b0000000005000500000000000a0000000000e8ad3d8261c28a9539b4df722a2c905bb07891b5e4db362bf84b78c78d4afad7601c2cf90000000000"], 0x98}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_WRITE(r1, &(0x7f0000000040)={0xf, 0xfffffffffffffff9, 0x6, {0x4}}, 0x18) 00:17:42 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:42 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x0, 0x0) ioctl$UI_SET_PHYS(r1, 0x4008556c, &(0x7f00000001c0)='syz1\x00') write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:43 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) setsockopt$IP_VS_SO_SET_DELDEST(r0, 0x0, 0x488, &(0x7f0000000000)={{0x4, @empty, 0x4e24, 0x2, 'dh\x00', 0x30, 0x3, 0x35}, {@multicast2, 0x4e22, 0x2001, 0x3, 0x10000, 0xbcf5}}, 0x44) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f00000001c0)={'icmp\x00'}, &(0x7f0000000180)=0x2af) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 1047.785475] audit_printk_skb: 36 callbacks suppressed 00:17:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x80) ioctl$SNDRV_TIMER_IOCTL_START(r1, 0x54a0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)={0x2, 0x400000000000003, 0x3, 0x3, 0x2, 0x0, 0x70bd25}, 0xfffffffffffffcb0}}, 0x0) [ 1047.785531] audit: type=1400 audit(1560471463.117:5831): avc: denied { prog_load } for pid=22923 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 [ 1048.018166] audit: type=1400 audit(1560471463.387:5832): avc: denied { prog_load } for pid=22923 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 00:17:43 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030003130000000000000000000000050000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000080002000100000000001000020b0000000005000500000000dd91705b0000000000ff0200000000e5ff00000000000000010000000000000000"], 0x98}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x101000, 0x0) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f00000001c0)) getpeername$netlink(r0, &(0x7f0000000000), &(0x7f0000000040)=0xc) r2 = dup2(r0, r0) ioctl$TUNSETVNETLE(r2, 0x400454dc, &(0x7f0000000140)=0x1) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000200)=0x0) capget(&(0x7f0000000240)={0x399f1736, r3}, &(0x7f0000000280)={0x5, 0xb05, 0xf07, 0x5, 0xfffffffffffffff9, 0x1ff}) 00:17:43 executing program 5: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x400000, 0x0) ioctl$TCSETX(r0, 0x5433, &(0x7f00000001c0)={0x1, 0x1, [0x6, 0xdcec, 0x4, 0x7, 0x2], 0x1}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = perf_event_open(&(0x7f00000004c0)={0x4, 0x70, 0x71, 0x0, 0x0, 0x18000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000000800)="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", 0x600) write$P9_RAUTH(r1, &(0x7f0000000140)={0x14, 0x67, 0x1, {0x30, 0x3, 0x4}}, 0x14) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000000)=0xfef) sendfile(r1, r3, 0x0, 0x10000) perf_event_open(&(0x7f00000000c0)={0x7, 0x70, 0xffffffffffffff80, 0x5, 0x5, 0x728b2b16, 0x0, 0x100000001, 0x610, 0x0, 0xd8ae, 0x9, 0x4, 0x4, 0xffffffffffffff7f, 0x7, 0x7, 0x1, 0x4, 0x4, 0xfff, 0x54c0, 0x4, 0xa7a, 0x80000001, 0x0, 0x5, 0x1, 0x3, 0xb8, 0x3ff, 0x1, 0x1, 0x8000, 0x8001, 0xfffffffffffffff9, 0x80000001, 0xfff, 0x0, 0xd3f, 0x2, @perf_bp={&(0x7f0000000040), 0x8}, 0x20000, 0x0, 0xf47b, 0x8, 0x8, 0x0, 0x1}, 0x0, 0xd, r2, 0x2) 00:17:43 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:updpwd_exec_t:s0\x00', 0x23, 0x3) fcntl$getflags(r0, 0xb) sched_yield() sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="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"/262], 0x106}}, 0x8041) openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x4000, 0x0) 00:17:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600800000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000200000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:44 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:44 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="666c3df812f68862712edd141371566a78398d8c74b572f10e7ec09350fcafeede0627856eaf163fa7bacb0800000000000000a0a47ae42b04b56b216bf85f43", @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x0, 0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f00000001c0)={0x101, 0x3, 0x0, 0x1f, 0x3, 0x3, 0x9, 0x20000000000040, 0x5, 0x2}) 00:17:44 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000014c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000001480)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001580)={&(0x7f0000001500)={0x50, r1, 0x305, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfa4b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x50}}, 0x8010) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 1049.092390] audit: type=1400 audit(1560471464.457:5833): avc: denied { relabelto } for pid=22957 comm="syz-executor.4" name="KEY" dev="sockfs" ino=51296 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:updpwd_exec_t:s0 tclass=key_socket permissive=1 00:17:44 executing program 5: mkdir(&(0x7f0000000100)='./file1\x00', 0x0) r0 = creat(&(0x7f00000005c0)='./file1\x00', 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file1\x00', 0x40000000) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x0, 0xffffffffffffffff) mount(&(0x7f0000000000), &(0x7f0000000240)='./file0\x00', 0x0, 0x1000, 0x0) mount(&(0x7f0000000080)=@filename='./file0\x00', &(0x7f00000000c0)='./file1\x00', 0x0, 0x2000, 0x0) [ 1049.353133] audit: type=1400 audit(1560471464.717:5834): avc: denied { relabelto } for pid=22957 comm="syz-executor.4" name="KEY" dev="sockfs" ino=51302 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:updpwd_exec_t:s0 tclass=key_socket permissive=1 00:17:44 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xfffffe3b}}, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000100)={'L+', 0xff}, 0x7c, 0xfffffffffffffffe) 00:17:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x2}, 0x10}}, 0x0) 00:17:45 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d303030304630303030303f0000001c3030303430303d00"/42, @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000006000), 0x7) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) fstat(r0, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x8, &(0x7f00000002c0)=[0xee01, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee00, 0x0, 0xee00, 0xee01]) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f00000003c0)=[0xffffffffffffffff, 0xffffffffffffffff]) r5 = getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) r8 = getgid() getgroups(0x2, &(0x7f0000000600)=[0x0, 0x0]) r10 = creat(&(0x7f0000000240)='./file0\x00', 0x0) setsockopt$inet6_opts(r10, 0x29, 0x3b, &(0x7f0000000280)=@routing={0x7f, 0x4, 0x0, 0x3, 0x0, [@loopback, @remote]}, 0x28) stat(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lsetxattr$system_posix_acl(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0)='system.posix_acl_access\x00', &(0x7f00000007c0)={{}, {0x1, 0x2}, [{0x2, 0x6, r1}], {0x4, 0x2}, [{0x8, 0x5, r2}, {0x8, 0x2, r3}, {0x8, 0x2, r4}, {0x8, 0x2, r5}, {0x8, 0x2, r6}, {0x8, 0x2, r7}, {0x8, 0x0, r8}, {0x8, 0x1, r9}, {0x8, 0x0, r11}, {0x8, 0x1, r12}], {0x10, 0x4}}, 0x7c, 0x2) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 1049.667819] audit: type=1400 audit(1560471465.037:5835): avc: denied { create } for pid=22970 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1049.842558] audit: type=1400 audit(1560471465.207:5836): avc: denied { write } for pid=22970 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:45 executing program 5: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000000c0)=ANY=[]}}, 0x0) clone(0x18000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'vcan0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xbe7db80a06e06587}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=@getstats={0x1c, 0x5e, 0x428, 0x70bd2c, 0x25dfdbff, {0x0, 0x0, 0x0, r2, 0x2}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x1) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) ptrace$cont(0x18, r0, 0x0, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$F_GET_RW_HINT(r4, 0x40b, &(0x7f0000000080)) close(r3) ioctl$TIOCSSERIAL(r3, 0x541f, &(0x7f00000003c0)={0xfcd, 0x100000001, 0xba, 0x3, 0x80000000000, 0x40, 0x1, 0x4, 0x3, 0xfffffffffffff000, 0x1, 0x8001, 0x9, 0x67, &(0x7f0000000300)=""/152, 0x6, 0xfffffffeffffffff, 0x800}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 00:17:45 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 1050.444186] audit: type=1400 audit(1560471465.807:5837): avc: denied { read } for pid=22970 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:45 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) sched_getattr(r1, &(0x7f0000000040), 0x30, 0x0) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:45 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000e7a40cd67f4c0c8ca44b5522bdfe000000000000010000000000000000"], 0x98}}, 0x0) [ 1050.560237] audit: type=1400 audit(1560471465.927:5838): avc: denied { create } for pid=22970 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:46 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000080)={0x1, 0x6, 0x1}) write$P9_RWALK(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="990100006f5c9df3c1b4658102000100010000000005"], 0x16) prctl$PR_GET_FP_MODE(0x2e) 00:17:46 executing program 3: open(&(0x7f00000001c0)='./file0\x00', 0x100, 0x80) r0 = open(&(0x7f0000000240)='./file0/file0\x00', 0x100, 0x40) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r1, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:46 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20000, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000580)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'team0\x00', 0x1000a803}) ioctl$TUNGETSNDBUF(r1, 0x800454d3, &(0x7f00000000c0)) 00:17:46 executing program 4: sendmsg$key(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x2, 0x3, 0x20000036, 0x0, 0x70bd2d}, 0x98}}, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) fremovexattr(r0, &(0x7f0000000000)=@random={'os2.', '\x00'}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r2 = perf_event_open(&(0x7f0000000200)={0x5, 0x70, 0x401, 0x1, 0x101, 0x3, 0x0, 0x2, 0x40000, 0x2, 0xe52, 0x2a6, 0xffffffffffffff80, 0x92, 0x1, 0xfffffffffffffeff, 0x0, 0x8, 0x9, 0x3708957d, 0x9, 0x1, 0x0, 0xf614, 0x9, 0x2, 0x8b, 0x3f, 0x8fc9, 0x9, 0x32f2, 0x4, 0x1, 0xffff, 0x9, 0x1, 0x27c, 0x2, 0x0, 0x5, 0x4, @perf_bp={&(0x7f00000001c0), 0x4}, 0x802, 0x3f, 0x8, 0x4, 0x200, 0xe7, 0x2}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f00000000c0)={0x5, 0x70, 0x1, 0x20, 0x81, 0xfff, 0x0, 0x7, 0x20c20, 0x1, 0x0, 0x0, 0x7fff, 0x9, 0x34, 0x0, 0x1, 0x311, 0x81, 0x100000000, 0x9, 0x3, 0x10001, 0x40, 0x6, 0x8000, 0x0, 0x8e, 0x10001, 0xf2ef, 0x5, 0x80000001, 0x4, 0x0, 0x7, 0xf9, 0x7758, 0x4, 0x0, 0x8, 0x2, @perf_config_ext={0x2325, 0x9e}, 0x0, 0x9, 0x3d, 0x3, 0x9, 0xfff, 0x5}, r1, 0x6, r2, 0x2) 00:17:46 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB="f04f875626bec52aa9f995de7ec2ac78bdcf74e274d2506c4af0074af120394f7fa3038a000ff5b58a72899ff127c9c359f57ccc85fd2bfb19f6c9ee4447a2d4df4861027a623b3e73f81167ee217e50d5969e928a1ecba727d3bb549baf5b4d262ef5bd359e693551502c90562c95e00b8b9ff194c8814ebb3135fada9c0814b933010aa3456e9f9963404476db440e44ed4044e0a048007154f4f4c1320ebd151f9e45e933c574e52b1e88c979d3efe371593bca461c8dfca0af644a1dab92cd25420989f3c0d7b6d56a50163392756e9426c48f"]}}, 0x84) 00:17:46 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f0000000000)=ANY=[], 0x0) clone(0xfffffffffffffffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mlock(&(0x7f0000008000/0x4000)=nil, 0x4000) r1 = fcntl$dupfd(r0, 0x0, r0) write$selinux_create(r1, &(0x7f0000000140)=@access={'system_u:object_r:xconsole_device_t:s0', 0x20, '/sbin/dhclient', 0x20, 0x8}, 0x4b) prctl$PR_GET_NO_NEW_PRIVS(0x27) readlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/11, 0xb) sendmmsg$inet(r1, &(0x7f0000000600)=[{{&(0x7f0000000000)={0x2, 0x4, @loopback}, 0x10, &(0x7f0000000280)=[{&(0x7f00000001c0)="4f2fc5f810a45a671221618f084c5c39c5b2e467cdbfda8842cb846094cfc348b214864abe7ee61fac3f160599f5728b3ffec58e6bc9e23ff7e3a55d412bc9290e4be04263de324b41bf32f8e572c776d13579eddc773328ebb18a4f1472", 0x5e}, {&(0x7f0000000240)="ba91e32bd0dc79f38e18e660f82f415b5bc4956d275fe236a8030df0c46bbaba81f819e61616d9775661862a79d2511df432c893ca", 0x35}], 0x2, &(0x7f00000002c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x286e9187}}, @ip_retopts={{0x5c, 0x0, 0x7, {[@noop, @ssrr={0x89, 0x1f, 0x1f, [@multicast1, @loopback, @dev={0xac, 0x14, 0x14, 0x12}, @loopback, @multicast1, @multicast1, @empty]}, @noop, @cipso={0x86, 0x9, 0x5, [{0x7, 0x3, "ff"}]}, @generic={0x83, 0xe, "0a3b0623b2acd270dd3d87b6"}, @generic={0x44, 0x12, "0c5c117395fac90d92f588f73f9d6fc9"}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x4ae639b}}, @ip_ttl={{0x14, 0x0, 0x2, 0x9}}, @ip_retopts={{0x78, 0x0, 0x7, {[@ra={0x94, 0x6, 0x1}, @noop, @ssrr={0x89, 0xf, 0x0, [@loopback, @broadcast, @loopback]}, @ssrr={0x89, 0xf, 0x7f, [@empty, @multicast1, @multicast2]}, @ssrr={0x89, 0x17, 0x6, [@loopback, @loopback, @multicast1, @loopback, @broadcast]}, @end, @lsrr={0x83, 0xb, 0x30000000000, [@broadcast, @multicast2]}, @timestamp={0x44, 0x18, 0xbd1d, 0x0, 0xfffffffffffffff8, [{[], 0x1}, {[@remote], 0x54}, {[], 0x4}, {[], 0x7}]}, @rr={0x7, 0x7, 0x2, [@initdev={0xac, 0x1e, 0x0, 0x0}]}]}}}], 0x120}}, {{&(0x7f0000000400)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000440)="29bedefabc37601910d00bd0144e35f49c0f055ce2b8641a26114552d8ae188f65c3774d6d60f755ab2a4f71a0868bb2bfc13594fa119045005b4c553040df258bb3b168b028078ba0d0b2ec2006b6da3f6c4c19c99187f4f9c3898af7c71aa9935df70df45e32b80b52e5b70aceb3c457625d50979fa9dc4865e8b6705aec4f974b013178829fcb1da4f593de82d2abe04dcd", 0x93}, {&(0x7f0000000500)="81563c7def3650076de0b4d704b9fbd2155b5376d770bb8dbf3014e474d1b28b69a5733a7c87883e144c6eb2594cb87af609f7a1f438ea4ffa83b3e79735e65e88071f13ec4071827a55edd9df28312979abb2ecbbedfe2715c3261327c1aef7f267be656d3165ef2f42a7f2eae5c1de0576acb4a884fcac07fdd228836c6586199f10f376691140175e03e7f047c0c1ebb05be6443d374b768f619b", 0x9c}], 0x2}}], 0x2, 0x1) inotify_add_watch(r1, &(0x7f0000000680)='./file0\x00', 0x40000480) r2 = socket(0x7, 0x1, 0xb56) recvfrom$inet6(r2, &(0x7f00000000c0)=""/5, 0x5, 0x40000040, &(0x7f0000000100)={0xa, 0x4e22, 0x6, @ipv4={[], [], @multicast2}, 0x3}, 0x1c) 00:17:46 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xb5) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = dup2(r0, r0) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) 00:17:47 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) [ 1051.860630] audit: type=1400 audit(1560471467.227:5839): avc: denied { create } for pid=23019 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1051.981050] audit: type=1400 audit(1560471467.347:5840): avc: denied { create } for pid=23019 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:47 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000040), 0x4) 00:17:47 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x2, 0x3, 0x8, 0x9, 0x2, 0x0, 0x70bd27, 0x25dfdbfe}, 0x10}}, 0x8000) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000300)=ANY=[@ANYBLOB="0203000313000009000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff02000000000000000000000000000100000000000000008564e7d0ca441b5dc4a2e99ffee184aaef56"], 0x98}}, 0x0) r1 = add_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)="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", 0xfb, 0xffffffffffffffff) keyctl$KEYCTL_PKEY_QUERY(0x18, r1, 0x0, &(0x7f0000000280)='\x00', &(0x7f00000002c0)) 00:17:47 executing program 1: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000200000000000a000000000031d1e21e0000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x80000000000, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x45b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x4, 0xb) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24, 0xf4d, @remote, 0x200}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) 00:17:48 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0303000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600e9866172e8719cfd00000000000000000002000100000000000000020b00000000050005ffffffffff0900000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:17:48 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x2, 0x0, 0x3, 0x12, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_x_nat_t_port={0x1, 0x15, 0x4e23}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x90}}, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xb8, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x30, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@broadcast}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5aa}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xaad}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x1a}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x100}]}, 0xb8}}, 0x4048050) 00:17:48 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="2c67726f75707f69643d50fe129ae5c47ec7c981f8855916aba61ddf544d239401b02c04da3ad462e4751add26227f3c5fe60f38be60ab81e9689c456d4c0b6b74d719ab15e29ed5aa5376034e1c3bed3369d7ae4571b49e51721bc9aaa7a1d1646921bdf7993d46afa84f9b62fed38935bd0154e385e714246c0a60ab0b37cf9e506d09cacf9c26d39f5f57c3c49025c3a993ea361da86821acf301836461989bcc73ad58066875ec03db56e00aee20238785d29ce9d0a31c2f11523b634962645368998d", @ANYRESDEC=0x0, @ANYBLOB="2c6673757569643d737f3365770039302d3500397f2d7f3334652d31387f312d77777f39757f77002c666f776e65723c", @ANYRESDEC=r1, @ANYBLOB=',defcontext=sysadm_u,\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) ioctl$int_in(r0, 0x5452, &(0x7f00000001c0)=0x20) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r2 = getpgid(0x0) finit_module(r0, &(0x7f0000000080)='\'\x00', 0x3) r3 = fcntl$getown(r0, 0x9) rt_tgsigqueueinfo(r2, r3, 0x32, &(0x7f00000003c0)={0x1a, 0x6, 0x9}) 00:17:48 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000040)="d904d5ab6b25349094c1a7e5c70e0da7f383b6359db009ef016e4d", 0x1b}], 0x1, 0x0) r2 = getpgrp(0x0) fcntl$lock(r1, 0x25, &(0x7f00000000c0)={0x1, 0x0, 0x71, 0x8, r2}) 00:17:48 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:48 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x2000, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x0, 0x7f}]}) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 1053.456145] audit: type=1400 audit(1560471468.827:5841): avc: denied { create } for pid=23053 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1053.632737] audit: type=1400 audit(1560471468.997:5842): avc: denied { write } for pid=23053 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:49 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',\b\x00\x00\x00\x00\x00\x00\x00=', @ANYRESDEC=0x0, @ANYBLOB="2c00974d26943e52cfa54901d82df7f1afd9a97e020c06500cb7c7cf57227e269a48d052ad66d59f1afc9c8865852104bf45f4b5fa02d27da5cfee03ed379550232bb9b05cbd5fd4022fb6a244908e0e40ffdcf66afba65c356212e7f793c34a0983c8403db2b127fd1fcbf54db92f2a81280d4ef7c4de860c25037006d22dd4bc64433df05f1f5e7cb6137dbf631093b3785fbcd89d3588ece860138ff78ead81830c5499ec14ee295f584d44ae8c6c90be389fe4fae7919039db4fbbb618ffc993620a3865a1a916365a2a"]) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x1, 0x0) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/validatetrans\x00', 0x1, 0x0) r1 = eventfd(0x1ffffffffffffe) r2 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r2, 0xc018620c, &(0x7f0000000080)) io_setup(0x1, &(0x7f0000000100)=0x0) io_submit(r3, 0x2, &(0x7f00000006c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) fcntl$setlease(r1, 0x400, 0x0) ioctl(r0, 0x71da, &(0x7f00000000c0)) 00:17:49 executing program 5: r0 = memfd_create(&(0x7f0000000380)='security.selinux\x00', 0x0) ioctl$TIOCSRS485(r0, 0x542f, &(0x7f0000000000)={0x7, 0xfffffffffffffffd, 0x7}) pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000640)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x80, r3, 0x4, 0x80, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x64, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3ff}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x1ff}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xff}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x9}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@local}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xf82}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}]}, 0x80}}, 0x8000) ioctl$BLKRRPART(r1, 0x125f, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) write$binfmt_misc(r0, &(0x7f00000003c0)={'syz1', "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"}, 0x100) symlink(&(0x7f0000001000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') umount2(&(0x7f0000000280)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file1\x00') [ 1054.222036] audit: type=1400 audit(1560471469.587:5843): avc: denied { create } for pid=23053 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:49 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0100000000000000000000000000000000ffff000000000000000000000000052b9e6843a866115076b2000000000000080000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000800000000010000000000000000addad67b156c76ab6f7e854de65c0abd1831"], 0x98}}, 0x0) 00:17:49 executing program 4: mincore(&(0x7f00009ff000/0x600000)=nil, 0x600000, &(0x7f0000000140)=""/163) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f0000000000)=0x5, 0x4) [ 1054.776138] audit: type=1400 audit(1560471470.147:5844): avc: denied { create } for pid=23089 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:50 executing program 3: r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) mkdirat$cgroup(r0, &(0x7f0000000240)='syz0\x00', 0x1ff) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="0000000000000000653d30303030303030303030303030303030303034303030302c757365726c69643dfdf51c98fb966a6bab262e0f64ea5f4346a05508138069589a58e144a526969f0d54af340a7dc9c004e5c8b981e20b067257a5b79262b99b9fb85eb6477910e8dd78705c4eccd62e6c1db12cbee2f363d1ab7599ab48c0e98a1cd877fc320fb88f10c92f65e42ec5be05353ab6c7cce2e7aa135db488cd4650e61d92e87dfd1dfbadeb494dffb4076331ee3337252ab116c2e39185235ebf3513a39e", @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r1, &(0x7f0000003000), 0x7c) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r2, 0x54a3) write$P9_RMKDIR(r2, &(0x7f00000001c0)={0x14, 0x49, 0x1, {0x20, 0x2, 0x1}}, 0x14) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x14000, 0x0) read$FUSE(r1, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r1, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r1, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:50 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000180)={0x9, 0x5, 0x9f, &(0x7f0000000200)="434a821a15487ba03a12078353aa9d2b52d76f4343064e3fb52e66bb511b562943b4831e910ce8e984164c6e388244e80c5c65c79bfb45838a02537f302b4982fd28f4b88036056dea34f25e2949e898699c882f1c3f69028017c0e8802d4546420e4244a3e6b81969306d2cb2dc32d1ea3cb3ab63c113dc7f851a7f8077705deea6fc81f3ff2f6e499d4a714934b973b54645afb94462408ea4df86fddb2d"}) symlink(&(0x7f00000001c0)='..', &(0x7f00000002c0)='./file0\x00') r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x2, 0xd, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, [@sadb_x_sec_ctx={0x1}, @sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0xa8}}, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) [ 1054.966909] audit: type=1400 audit(1560471470.337:5845): avc: denied { write } for pid=23089 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:50 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:50 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) lsetxattr$security_ima(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.ima\x00', &(0x7f0000000140)=@sha1={0x1, "6be506a831df6d0bacd06b871dd4688dfdd5f369"}, 0x305, 0x2) [ 1055.373713] audit: type=1400 audit(1560471470.737:5846): avc: denied { read } for pid=23089 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:50 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="02030003130000000000000100000000050006000000bed80a0000000000000000000000000000000000ffff00000000000000000000000005000900000080000a0000000000000000000000000600000000000000000000000000000051cb650a13d939240b00000002002100000000000000020b00003f0f3d1d090338546ece26a7868d000005000500000000000a0000007a890000ff0200"/166], 0x98}}, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/full\x00', 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000400)={0x0, 0x0}, &(0x7f0000000440)=0xc) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) setresuid(r2, r3, r4) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_TOL(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r5, 0x0, 0x70bd28, 0x25dfdbff, {{}, 0x0, 0x4107, 0x0, {0x14, 0x18, {0x4, @bearer=@udp='udp:syz0\x00'}}}, [""]}, 0x30}, 0x1, 0x0, 0x0, 0x4000}, 0x20008040) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000040)={r1, &(0x7f0000000140)="3c6e6769c3bc39de31de069b0d073bd8c19c9e368f6ea39decc4c823f1ea46b700d687a632c341bcc3dc487b09d1f052c7d86438bd7ffc528bad52817060500c6b73159b1a80e1c6d1d4f16347c385fa81f3d06b9895eb95d3d6a6ace13c8469013b460a3cdf5f413b86a4cdf61370bad1c914b1010a942b8ebd736a20ae1dc944b1dd048ee167771dfb4f45921cdfa4cefc783929e4a1350ed3b1a9583153f63de46bca2dcbeddcb2c869d850ddc6323840", &(0x7f0000000200)=""/75}, 0x18) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) sched_getscheduler(r6) [ 1055.508065] audit: type=1400 audit(1560471470.877:5847): avc: denied { create } for pid=23089 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1055.510433] audit: type=1400 audit(1560471470.877:5848): avc: denied { write } for pid=23089 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:51 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x4b64, 0xffffffffffffffff) 00:17:51 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000040)={0x1, 0x7}, 0x8) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @loopback}, 0x10) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x900, 0x0) getpeername$inet(r0, &(0x7f0000000340)={0x2, 0x0, @remote}, &(0x7f0000000380)=0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0xc0, r2, 0x0, 0x70bd2c, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'team_slave_0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3ff}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @empty}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_DEST={0x58, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@ipv4={[], [], @broadcast}}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e23}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x1}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xec}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e20}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_L_THRESH={0x8}]}]}, 0xc0}, 0x1, 0x0, 0x0, 0xc1}, 0x4) sendto$inet(r0, &(0x7f0000000080)="2f37ff3921a2d323f056b8ac3b0a71a0a4e53e0e59e5440e3f9d436642e217229a7a961d991d42df9add27b5e41b8e27d627edca57ef3849f09b57ce9e5fd56e5ecb9a575b3a9fdfb014a2c5a6db470a85d1eaf97c2b6c6f701e93774393c43ac2b03eaa673e903e8d7818453df0d6cf248ec261cb48bb97d6028b31362c282571ddf670e1de08091455b5b7efd948355b629b6aa300e2b4b854e32799", 0x9d, 0x44000, &(0x7f0000000000)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) close(r0) 00:17:51 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = fcntl$getown(r0, 0x9) setpriority(0x0, r1, 0x40) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0x0) sendmsg$nl_xfrm(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000240)={&(0x7f00000000c0)=@getsadinfo={0x160, 0x23, 0x720, 0x70bd26, 0x25dfdbfb, 0x0, [@policy_type={0xc}, @ipv4_hthresh={0x8, 0x3, {0x0, 0x10}}, @algo_auth={0xb0, 0x1, {{'tgr128\x00'}, 0x330, "91ac2f08ac8f767f0b9f6e18d20256b35f7acceb39ae06cdf284e746a0586b0c5e6d1e9e9a2d6ea143d79fe20b3a0420e4b348ae835dee33aa79434090c76e52ffc1a0d4e7f5d5e11138c5022200c5aa81e1674b9bf0c4be2b996b7bd3a204ec89aec6271124"}}, @migrate={0x88, 0x11, [{@in6=@dev={0xfe, 0x80, [], 0xc}, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x3f, 0x0, 0x0, 0x3506, 0xa}, {@in6=@empty, @in=@multicast1, 0x6c, 0x4, 0x0, 0x3502, 0xa, 0xa}, {@in=@broadcast, @in=@local, 0x7f, 0x3, 0x0, 0x34ff, 0x2, 0xa}]}]}, 0x160}, 0x1, 0x0, 0x0, 0x41}, 0x8000) gettid() fchdir(r0) setpriority(0x1, 0x0, 0x0) 00:17:51 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a000000000000000000000000060000000000000000000000000000000000e401000100000000000000020b0000000005000500000000000a00000000001166ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, 0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000180)='/dev/full\x00'}, 0x30) tkill(r1, 0x39) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000140)={'U-', 0xfffffffffffffffa}, 0x28, 0x1) openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x200000, 0x0) [ 1056.276311] audit: type=1400 audit(1560471471.647:5849): avc: denied { create } for pid=23126 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1056.462972] audit: type=1400 audit(1560471471.827:5850): avc: denied { write } for pid=23126 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:52 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:52 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0xffffffffffffff31) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:52 executing program 5: r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2080040}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x54, r1, 0x20, 0x70bd2c, 0x25dfdbfb, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x100000000}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x5}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x2}]}, 0x54}, 0x1, 0x0, 0x0, 0x4000}, 0x20000880) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r3, 0x1, 0x7, &(0x7f0000ac5000), 0x4) sendmmsg$unix(r3, &(0x7f00000bd000), 0x53, 0x0) r4 = memfd_create(&(0x7f00000002c0)='dev #\xe7wc\x96\xd3K\x90\xdc\xbc/>)q\x8f+\x91n\xe7\xf2\x8c\x89\xb0\xbe$\\\x11\xc4\xa5\x86&\\\x13\\\xef9\xb7\xaf\xc8\x92to\x12\xb1\xce\xe9\x84\xa8/\x9b\xb1u\xab\x95\xd2\x14\xa1\xb5@\x8c\xb7\x15a\x8c\x9c\xf8\xa9h#\x10\x11MDh.\xac\x13;[\xe9\xe0\x1b\x11\xae\x89\x8f\xce\xeb\x06\x1f\xe2\x0f\xdb\xe4\xb1\x1b\xef|-7\xd8\xdc=\x8a\xc1\xb6\xd8\xa1~4\xe8P\xaa\xb5W\x99\xcd;a\xc4\x87\x89\x7f\xcc\x83\x05\xbd\xfa\xeaC\x04\x03\x93x\xa0\x16\xa0\xfc@\xb6-\x85.\xa8\xb1\x0f\x12\xcap\xafh\x14W\x1d\x7f\xe5\x86\a\xc4@\x0e\xd1\x8a\x00\xe0\xdbv\xb9.\xa5\x85\x86\xda<\xc5', 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="bd5cd470fa1d99b3b6a807eb29bd25f9", 0x10) write(r4, &(0x7f00000001c0)="16", 0x1) sendfile(r3, r4, &(0x7f0000000000), 0xffff) dup2(r4, r2) 00:17:52 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)={0x2, 0x400000000000003, 0x0, 0x3, 0x2e7, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_spirange={0x0, 0x10, 0x4d6, 0x4d6}]}, 0x98}}, 0x0) 00:17:52 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000800000000000000000a0000000000000000000000000000000000ffff00000000000000000004000005000900000000000a0000000000000000000000000600000000000000000000000000000000800002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) clock_gettime(0x0, &(0x7f0000000600)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000540)=[{{&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000140)=""/213, 0xd5}, {&(0x7f0000000240)=""/196, 0xc4}, {&(0x7f0000000340)=""/228, 0xe4}], 0x3, &(0x7f0000000480)=""/138, 0x8a}, 0x20}], 0x1, 0x101, &(0x7f00000005c0)={r1, r2+30000000}) 00:17:53 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:53 executing program 5: r0 = memfd_create(&(0x7f00000003c0)='/d-\x1b\xb3\x82\xf9/J\xb0p*\xd8\x00\xea\x03\x83\xd8\x16\x88Qt\xceh\xeb\xb2\xc4\xfbf\xe1\xd5\xe5\x9aS\x964\xb5L/\xdb\xb4\xec\xd7C\xed\xcf\f\x01\x15\xae!T\x9eU\xee\xc6]3\xdb\xadx\x19\xf0w}y\x0f\xc3\xf2\xea;\x93\xe9\x13\x97E\xd8i\f6\xb6\xf9\\\xbd\xd1\\\x19\x0e\x93\x05\nC\x1b8)\xe3\x9b{\x8bT\x8a\xec\a\xc9-;\xf55n\xd1~\x7f\xa8eB\xc40&l\'a\x19\xdf\xad\x9aan\xaa\xc1h\x9e\x9a\xa94\xdcI{\xa9\xf3\x00u\xfb\x83\xa2An\x1cN\x05w\xcb\x811A\x98G\x87j\x02\x8cC\xed#\xb8+\xf2G6\xe5\xe8\x88<2\x92\x13&\x96\xe6\xdbl\xb0\x99\x9e\xe8Q\xd3\xe9S0\xb9\xb0\'\xf5\x05\xecV}\x89Z\n\xc5.\xf5\xa7\xe1\x97\x9dq\xe8\xa6\x99\x9d8b\xd3\xd9\xbe\x02D\x13\x19b\x7fm2\xed\xad\x04\x80\x12GM\x9dZ@=\xc9\x14\xf8\xdcb\x92@\xd1\xbb\xd2\xa331\x19\x8a\xc8:\xa1\xe6\xc2)', 0x0) write$eventfd(r0, &(0x7f00000001c0)=0x2, 0x8) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x20080, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'vlan0\x00', {0x2, 0x4e20, @broadcast}}) sendfile(r0, r1, &(0x7f0000000100), 0x10003) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000004, 0x11, r0, 0x0) setsockopt$inet6_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000080)=@ccm_128={{0x303}, "d3d8ffa478c2c555", "bbb53d5fca05e4598fe64a5552d957d2", "32bc0095", "d35d50804578f28c"}, 0x28) r2 = creat(&(0x7f0000000180)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000280)=ANY=[@ANYPTR64, @ANYRES32=r2, @ANYRESHEX=r1, @ANYRESDEC, @ANYRESOCT=r2, @ANYRES64=r0]) 00:17:53 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x4, 0x10000) 00:17:53 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x7fff}], 0x1) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:53 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) pivot_root(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00') ioctl$UI_DEV_CREATE(r1, 0x5501) mknodat(r1, &(0x7f0000000180)='./file0\x00', 0x8140, 0x4) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000004000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000008000"], 0x98}}, 0x0) 00:17:54 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000040)) r0 = fcntl$getown(0xffffffffffffffff, 0x9) prlimit64(r0, 0xe, &(0x7f0000000000)={0x0, 0x4000000000000}, 0x0) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x100) write$P9_RCLUNK(r1, &(0x7f00000000c0)={0x7, 0x79, 0x1}, 0x7) pipe(0x0) 00:17:54 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'eql\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*', 0x8002}) ioctl$sock_ifreq(r0, 0x8914, &(0x7f00000000c0)={'eql\x00\x00\x00\xa9[\x00', @ifru_mtu=0x1}) r2 = socket$inet6(0xa, 0x2, 0x2) ioctl$sock_ifreq(r2, 0x8922, &(0x7f0000000180)={'eql\x00\x00\x00\xa9[\x00', @ifru_map={0x1ff}}) 00:17:54 executing program 0: prctl$PR_GET_FP_MODE(0x2e) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000040)=@req={0x28, &(0x7f0000000000)={'bond_slave_0\x00', @ifru_map={0x8, 0x7fffffff, 0xff, 0x7f, 0x6, 0xf2}}}) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/commit_pending_bools\x00', 0x1, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000200)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)=@newqdisc={0x84, 0x24, 0x300, 0x70bd26, 0x25dfdbfc, {0x0, r2, {0xfff2, 0xffff}, {0x1, 0xfff3}, {0x1, 0x6e5bed71cbf996dd}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x200000}, @TCA_RATE={0x8, 0x5, {0xb1c, 0x5}}, @qdisc_kind_options=@q_sfq={{0x8, 0x1, 'sfq\x00'}, {0x48, 0x2, {{0x0, 0x42e8, 0xffff, 0xf1, 0x7f}, 0x8, 0x0, 0x7, 0x1, 0x9, 0x1c, 0xf, 0x1c, 0x2, {0x7c8e, 0x2, 0x6, 0x80000001, 0x100000000000, 0x7}}}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000000) 00:17:54 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:54 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000005000900000000000a000000000000000000000000060000000000000000000000000000000000000200010000000000f5ff010bb940000005000500000000000a000000000030f790159b91ba6eddf65c2c171f392371047613330c0000ff0200000000000000"], 0x98}}, 0x0) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/commit_pending_bools\x00', 0x1, 0x0) write$FUSE_POLL(r1, &(0x7f0000000040)={0x18, 0xffffffffffffffda, 0x6, {0x81}}, 0x18) 00:17:54 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB="2c726f6f746d6f64653d30303030303030303030303030303030303034303030302c757365725f69643d51ab00ea2a10fa8d004ec6d13580b816c529f7bfb9", @ANYRESDEC=0x0, @ANYBLOB=',group_ad=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = accept(0xffffffffffffff9c, &(0x7f0000000240)=@sco, &(0x7f0000000080)=0x80) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000005c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10800}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)={0x1f3, r2, 0xf08, 0x70bd2a, 0x25dfdbfe, {}, ["", "", ""]}, 0xff43}, 0x1, 0x0, 0x0, 0x7fe}, 0x20000000) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000340)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000480)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1040000}, 0xc, &(0x7f0000000440)={&(0x7f00000003c0)={0x58, r3, 0x1, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x7}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x3}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x100}]}, 0x58}, 0x1, 0x0, 0x0, 0x80}, 0x880) 00:17:54 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000080)={0x2, 0x0, [0x0, 0x0]}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmmsg(r2, &(0x7f0000004bc0)=[{{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000100)="b54c0034afea6de85a15b2c544117c0c", 0x10}], 0x1}}], 0x1, 0x0) 00:17:55 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='stack\x00') ioctl$TIOCGPTPEER(r0, 0x5441, 0xfffffffffffffffd) rt_sigprocmask(0x0, 0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)={0x2, 0x3, 0x0, 0x3, 0xc, 0x0, 0x0, 0x0, [@sadb_key={0x2, 0x9, 0x8, 0x0, "e5"}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x60}}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e21, 0x0, @loopback}, 0x1c) 00:17:55 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='rdma.current\x00', 0x0, 0x0) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x9, 0x7, 0x1000}, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000140)={0xb, 0x38a70dd0479aff18}, 0x3) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="2325202e2f6669dc345b64b6f06c653020776c616e3125af70726f6373656c696e7578707070310a4ef553831f28b9f4b004d6d039927779725eafb6e907e1d89cc4886e5a2f24bda610c23ffefffd93ff488ce39bf269d535192b994ac4351ab9d4d801561ad977d2821ed2c658492f0054c823985eddfaac1798768b0d066e32247869e691feb89c0fc84dd72b13bb0062540349bd34ba2101aa96e36f6b0b2a224e7854fc85bf0ff56444b21667fdf6e0a73e076906"], 0xb7) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000080)={0x2, 0x70, 0x9f7, 0x11, 0xfffffffffffff800, 0x493, 0x0, 0x1ff, 0x1, 0xc, 0x3ff, 0x8001, 0x0, 0x2, 0x7, 0x7, 0xf9, 0x7, 0x7, 0xd8a, 0x5fa, 0x51f, 0x4, 0x6, 0x100000000, 0x4, 0x0, 0x1, 0x2, 0x6, 0x3, 0x25, 0xe83e, 0xdf, 0x3, 0x5b, 0x1, 0x1, 0x0, 0x0, 0x3, @perf_config_ext={0xff, 0x7}, 0x0, 0x7f, 0x7, 0x6, 0x4, 0x1, 0x9}) 00:17:55 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000600)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/82, 0x52}, {&(0x7f0000000140)=""/245, 0xf5}, {&(0x7f0000000240)=""/186, 0xba}, {&(0x7f0000000300)=""/21, 0x15}, {&(0x7f0000000340)=""/70, 0x46}, {&(0x7f00000003c0)=""/127, 0x7f}], 0x6, &(0x7f00000004c0)=""/239, 0xef}, 0x40) [ 1060.541256] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=60079 sclass=netlink_xfrm_socket pig=23225 comm=syz-executor.1 00:17:56 executing program 1: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000180)=0x200000000007fe, 0x4) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000140)=0x8, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000cd2ff0)={0x2, 0x4e21}, 0x10) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x12000, 0x0) write(r1, &(0x7f0000000240)="fc1c322166c3ef9d74a581b985e584642e73d2f30733f71f29067d4e140101b9760123b50df4585aa25a7e8f4462e8d273031dedce1cb51b992c55865f98d4e0f0c03184680712034438e5fbe719a79e53ca4167767ccb9e140e646ed2445f75995535586716c77c914fd67c128196e8f0f090d269059519eb9c87c433c3493a886e9af10fb389e245dd091c0103b8bac48f4b7e4060", 0x96) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000040)={{{@in=@empty, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFDSTADDR(r1, 0x8918, &(0x7f0000000200)={@empty, 0x27, r2}) recvmmsg(r0, &(0x7f0000003cc0), 0x400000000000355, 0x12001, 0x0) [ 1060.757748] audit_printk_skb: 33 callbacks suppressed [ 1060.757762] audit: type=1400 audit(1560471476.127:5862): avc: denied { create } for pid=23227 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1060.825391] audit: type=1400 audit(1560471476.197:5863): avc: denied { create } for pid=23227 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:56 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:56 executing program 5: bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)='(^\\\x00', 0xffffffffffffffff}, 0x30) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x200000, 0x0) pread64(r0, 0x0, 0x0, 0x0) r1 = geteuid() ioctl$TUNSETOWNER(r0, 0x400454cc, r1) 00:17:56 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ppoll(&(0x7f0000000000)=[{r0, 0x1}, {r0, 0x48}, {r0, 0xffffffffffffffff}, {r0, 0x100}, {r0, 0x2}, {r0, 0x220}], 0x6, &(0x7f0000000140)={r1, r2+10000000}, &(0x7f00000001c0)={0x753}, 0x8) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) [ 1060.850546] audit: type=1400 audit(1560471476.217:5864): avc: denied { write } for pid=23227 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1061.236436] audit: type=1400 audit(1560471476.607:5865): avc: denied { read } for pid=23227 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:56 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000140)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff000000000000000000000000050009000006000000000000000000000000007d70490e541cb103f3000000000002000100000000000000020b0000000005000500000000000a00000000000000ff02000013000000000000000000000100"/161], 0x98}}, 0x0) [ 1061.471376] audit: type=1400 audit(1560471476.837:5866): avc: denied { create } for pid=23227 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:57 executing program 1: ustat(0x3, &(0x7f0000000000)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x101000, 0x0) ioctl$BLKBSZSET(r0, 0x40081271, &(0x7f0000000080)=0x460a) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r1, 0x100, 0x70bd2b, 0x25dfdbff, {{}, 0x0, 0x410c, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x81) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000200)=""/208) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/context\x00', 0x2, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_create(0x3) ioctl$RTC_AIE_ON(r0, 0x7001) renameat(r3, &(0x7f0000000380)='./file0\x00', r0, &(0x7f00000003c0)='./file0\x00') r4 = gettid() wait4(r4, &(0x7f0000000400), 0x0, &(0x7f0000000440)) getpeername$unix(r3, &(0x7f0000000500)=@abs, &(0x7f0000000580)=0x6e) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000005c0)={0x1, 0x3, 0x2000}, 0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r3, 0x6612) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xa0050, r0, 0x0) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r2) sendto$inet6(r3, &(0x7f0000000600)="3644cae32c026a1f41f7009d31f21832156cdd685867c986789387516d7d5aa7c9b7c9c438a5ffee46dc359608537370b16777ec3d230fc47ce336c9c067d7d36a296705330d034283", 0x49, 0x50, &(0x7f0000000680)={0xa, 0x4e24, 0x401, @remote, 0x6}, 0x1c) write$P9_RLOCK(r0, &(0x7f00000006c0)={0x8, 0x35, 0x1, 0x1}, 0x8) chdir(&(0x7f0000000700)='./file0\x00') ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000740)) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000780)={0x32, 0x4, 0x0, {0x1, 0x3d, 0xa, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x32) openat$selinux_user(0xffffffffffffff9c, &(0x7f00000007c0)='/selinux/user\x00', 0x2, 0x0) write$FUSE_NOTIFY_DELETE(r2, &(0x7f0000000800)={0x3a, 0x6, 0x0, {0x2, 0x2, 0x11, 0x0, '/selinux/context\x00'}}, 0x3a) readlinkat(r3, &(0x7f0000000840)='./file1\x00', &(0x7f0000000880)=""/4096, 0x1000) r5 = dup3(r3, r2, 0x80000) syz_genetlink_get_family_id$nbd(&(0x7f0000001880)='nbd\x00') ioctl$BLKTRACESTART(r5, 0x1274, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r3, 0x0, 0x487, &(0x7f00000018c0), &(0x7f0000001900)=0x30) [ 1061.473738] audit: type=1400 audit(1560471476.837:5867): avc: denied { write } for pid=23227 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:57 executing program 5: r0 = dup(0xffffffffffffffff) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000040)={0x0, 0x4f2272f1, 0x1}) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(0x0, 0x2000028) getpeername$packet(r2, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000000c0)=0x14) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FICLONE(r1, 0x40049409, r2) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000500)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000580)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000540)={&(0x7f0000000680)={0x144, r5, 0x631, 0x70bd27, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_BEARER={0x64, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @loopback}}, {0x14, 0x2, @in={0x2, 0x4e23, @rand_addr=0x200}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x14, 0x2, @in={0x2, 0x4e21, @broadcast}}}}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xb4a3}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf6}]}, @TIPC_NLA_SOCK={0x38, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x78d5}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xf49}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x401}]}, @TIPC_NLA_NODE={0x28, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x73}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7fff}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x2c, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffff7}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8a40}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x20000004}, 0x80) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x531, 0x0, 0xfffffffffffffffa, 0x9, 0x0, 0x8, 0x88040, 0x1, 0x10001, 0xb74e, 0x3d, 0x9, 0x6, 0x3c1, 0xff, 0x6eac, 0x7fffffff, 0x400, 0x0, 0x10001, 0x43, 0x5, 0x0, 0x40, 0x1, 0x2, 0x3ff, 0x800, 0x1, 0xaf18, 0xcc, 0x80000000, 0xffffffffffffff71, 0x0, 0x2, 0x7ddb, 0x0, 0x1, 0x4, @perf_config_ext={0x9, 0x3fff80000}, 0x40, 0x100000000, 0x3f, 0x0, 0x4, 0x10001, 0x9}, r6, 0xf, r0, 0x1) chown(&(0x7f0000000380)='./file0\x00', r7, r8) sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f0000001240)={&(0x7f0000001140), 0xc, 0x0, 0x1, 0x0, 0x0, 0x20040880}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) mlockall(0x3) write(r4, &(0x7f00000003c0)="74a117b59d2ce3ed1b0b5d4c5765712ab67d4c5a5b4543621d050f7aebcee9496ef987840db48af54910e380acb28f8e69c87fbbcc7ca215769d182cd9324251c21c2d2f3c992ab38b94765444959eb91ed7a6ecfae658ad77a9177c2ea4a6acf73ec77f820eeeaf44c2168f0a68ed478545cc54439934a09bf8f3e8d74604ce00d21742c050b5e4283f00000000000000d2c25fa04dabc3c92ebade82969fdd7e9c799cf6e8d8d20bbca8f108d29200"/189, 0xbd) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x6) read(r9, &(0x7f0000000200)=""/250, 0x50c7e3e3) ioctl$TIOCLINUX3(0xffffffffffffffff, 0x541c, 0x0) io_submit(0x0, 0x4, &(0x7f0000000f40)=[&(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0, 0x0, 0x0]) setsockopt$sock_linger(r10, 0x1, 0xd, &(0x7f0000000480)={0x1, 0x2}, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) [ 1061.576879] audit: type=1400 audit(1560471476.947:5868): avc: denied { create } for pid=23227 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1061.579169] audit: type=1400 audit(1560471476.947:5869): avc: denied { write } for pid=23227 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:57 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) setsockopt$sock_void(r0, 0x1, 0x1b, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) write$P9_RCREATE(r1, &(0x7f0000000040)={0x18, 0x73, 0x0, {{0x5, 0x1}, 0x100001004}}, 0x18) socket$key(0xf, 0x3, 0x2) 00:17:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x9, 0x3, 0x200000000000025b, 0x0, 0x70bd2d}, 0x1}}, 0x0) 00:17:57 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x39b, 0x0, 0x2}, 0x4) [ 1062.404799] audit: type=1400 audit(1560471477.767:5870): avc: denied { create } for pid=23270 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1062.536634] audit: type=1400 audit(1560471477.907:5871): avc: denied { write } for pid=23270 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 00:17:58 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:58 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x98}}, 0x0) 00:17:58 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0xf, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_x_nat_t_type={0x1, 0x14, 0x4}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x78}}, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x24, r2, 0x404, 0x70bd2d, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x10001}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x20004800) write$selinux_validatetrans(r1, &(0x7f0000000000)={'system_u:object_r:ipmi_device_t:s0', 0x20, 'system_u:object_r:gpg_helper_exec_t:s0', 0x20, 0x200, 0x20, 'system_u:system_r:kernel_t:s0\x00'}, 0x7d) 00:17:58 executing program 1: r0 = epoll_create1(0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x10000000, 0x4, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0xa110000000, 0x0, 0x0, 0x2, 0x3f, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x40, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_aout(r1, &(0x7f0000000c40)=ANY=[@ANYBLOB="00004b22f401000063000000cac5ed5bc802000008000000000000000000000026f8227152fac46b4d2a0dd2638ba77a0b72c5102aa69dbbe2311ca2a4890bdf2fd98c399a9a29a702ee59791422e6ec754d344eed512167ba2a2af726d7cf89812680fa06c15049a9c98bb956fab30d96f027ee38f72808cd6be24f22b875000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d6da67fc9f242cd764ee781072c18b1f306505b2c3709ca0505c50a8df5bab448e09db0d8c35038f3de63cd958e4142ebde146198a8dc3dc8cedaef25feff1d353f2bb7ef04bc5b256047b93feeba55a8db7f0e4f6ffbebf520491b72b677ef9302637fc33953b75f328e0666ae527bc1e"], 0x97f) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ioprio_set$pid(0x3, r2, 0x7fffffff) r3 = creat(&(0x7f0000000000)='./bus\x00', 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) ioctl$EVIOCGABS0(r3, 0x80184540, &(0x7f00000000c0)) fsetxattr$security_selinux(r3, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) 00:17:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:59 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB='\x00'/10, @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f00000000c0)=0xee35) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:17:59 executing program 5: mkdir(0x0, 0x0) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) write$selinux_validatetrans(r0, &(0x7f0000000180)={'system_u:object_r:ssh_exec_t:s0', 0x20, 'system_u:object_r:udev_var_run_t:s0', 0x20, 0x4, 0x20, '/usr/sbin/cupsd\x00'}, 0x69) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000200)=[0x7f, 0x3]) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000080)={0x80000001, {{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x88) lstat(0x0, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20008800, &(0x7f0000000000)={0x2, 0x4e20, @multicast1}, 0x10) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c65302f66696c6530200aec04f141bc5891f1159f93e86b9025a7ce9b5beec43276a6790ab707d814e1ec44fbb4289cde65e8a58f95bd8852b44c6aa2a0917289"], 0x48) recvmmsg(r1, &(0x7f0000003a40)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x114}}], 0x789, 0x2, 0x0) 00:17:59 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) recvfrom$unix(r0, &(0x7f0000000000)=""/76, 0x4c, 0x41, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:59 executing program 1: r0 = socket$inet6(0xa, 0xffffffffffffffff, 0x0) fchdir(r0) getpid() perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f00000000c0)='./bus\x00', 0x800000141042, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x11) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) wait4(r2, 0x0, 0x0, 0x0) 00:17:59 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) getpeername(r0, &(0x7f0000000240)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000002c0)=0x80) sendmsg$inet(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10, &(0x7f0000000200)=[{&(0x7f00000001c0)="04f64b6f92ffa09d857c658b9031a1a999357eb85794e1d6068713e721c642390621820b1da88bafb758afa11e73", 0x2e}], 0x1, &(0x7f0000000300)=[@ip_tos_int={{0x14, 0x0, 0x1, 0xffff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x43}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @empty, @multicast2}}}], 0x50}, 0x4000041) r2 = fcntl$dupfd(r0, 0x0, r0) epoll_wait(r2, &(0x7f00000003c0)=[{}, {}, {}], 0x3, 0x17a) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000000)="e298d140bdeba87fb74d9ab0e784793a960ed7566dbaf218c837a88752523769", 0x20, r0}, 0x68) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:17:59 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 5: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f00000008c0)={'syz', 0x1}, &(0x7f0000000900)="49effb82f3f2957b051ab32a34cbdc214e3b1da8a319248a497053c27e26f9b23d782dd706fd992172282d63cf67fc4af7977c027e33b4996dac90661718dc1629307ac37163d4dbcdaeeda8fbc0b4319dba954a8be2eca793407a583cee49f832c5ca70c2f206f56621ddf18caff854124b8b56edd8da934bc7111040353769bb3c37aa311a88008bf79dd7ef2a45f0f73411d911c52568e357ee2fa656d3831e482420", 0xa4, 0xfffffffffffffffe) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000009c0)={r1, 0xb8, 0x1000}, &(0x7f0000001c80)=ANY=[@ANYBLOB="656e633d6f6165705b0320686173683d7467723132382d67656e6572696300000000000000000000000000000000000000000000000000000000000000000000eaac3934ac0595830000000000000000"], &(0x7f0000000a80)="2a00a7757e5ad84bd4fc79bf90c3e3a2330a3daa3ae9942f718b01eca73a9ee9ff0ebd4fd804db19e7d34314440e8fec44a8b15f6c6351c84bd3f674cef13f5de8be2e025cdf20c1e0264fcedb7b3faa950cb2bbc53b0a9100fdbe761ae1b51ecdcd455e5e9a67306da8134a39933d61c523d603424a5c3cb96a2bb5097058f337ae76ac906bf15246c1803c409e8e72853c764a38921edc93ab936b39578cab70581ecaf501a940d3525faa5f1e1f705aef0f36693c990c", &(0x7f0000000b40)=""/4096) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r2, 0x80) setsockopt(r2, 0x6, 0x80, &(0x7f0000001c00)="1dd89740eaed93452c4449ca7daadb3b42173b36091009d41567f17696b8665edc752a5e1beede33bcecc382bd272a16a6758d93399cdbe360d3c76b98cd8383c5711ceb57335f79816347056b7d6d98b42320b6a51ddc491243833dfbaa1f11adefd1678c1c84e4", 0x68) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22, 0x4003}, 0xfebd) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = dup2(r4, r3) clock_gettime(0x0, &(0x7f0000000680)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000040)=@hci={0x1f, 0x0}, 0x80, &(0x7f0000000580)=[{&(0x7f00000000c0)=""/37, 0x25}, {&(0x7f0000000140)=""/113, 0x71}, {&(0x7f00000001c0)=""/114, 0x72}, {&(0x7f00000002c0)=""/183, 0xb7}, {&(0x7f0000000380)=""/155, 0x9b}, {&(0x7f0000000440)=""/85, 0x55}, {&(0x7f00000004c0)=""/141, 0x8d}], 0x7, &(0x7f0000000600)=""/104, 0x68}, 0x81}], 0x1, 0x100, &(0x7f00000006c0)={r6, r7+10000000}) getresuid(&(0x7f0000001b80), &(0x7f0000000740)=0x0, &(0x7f0000001bc0)) setsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f00000007c0)={{{@in=@multicast1, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x3f, 0x4e21, 0x0, 0xa, 0x80, 0x80, 0x0, r8, r9}, {0x100000001, 0xfffffffffffffff9, 0xdd1, 0x7, 0x1f, 0x4, 0x80000000, 0x40}, {0x5, 0x101, 0x80, 0x8001}, 0xff, 0x0, 0x1, 0x1, 0x3, 0x1}, {{@in=@loopback, 0x4d4, 0x6c}, 0xa, @in6=@remote, 0x3501, 0x0, 0x3, 0x1, 0x4, 0x7, 0x7}}, 0xe8) dup2(r5, r2) 00:18:00 executing program 1: mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file1\x00', 0x0, 0x8}, 0x10) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000080)=r0, 0x4) 00:18:00 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x7) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB="fc95efe6bb4c427c2c67", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f0000000040)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x0) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:18:00 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000140)={0x2, 0x16, 0xa, 0x7, 0x18, 0x0, 0x70bd29, 0x25dfdbfb, [@sadb_x_sa2={0x2, 0x13, 0x1, 0x0, 0x0, 0x70bd2d}, @sadb_key={0xb, 0x9, 0x250, 0x0, "89d331052d4dfa9d9cf1006e985606a3d2aacf66ead768c2dbba2a7e595f25d6d7c5536dbd1f8eedae2038aa29b469ea853f288721d13c1e7705421cc428ed569424e9eea5f5bebf3e9e"}, @sadb_x_sa2={0x2, 0x13, 0x100, 0x0, 0x0, 0x70bd2b, 0x3501}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in6={0xa, 0x4e20, 0x3, @rand_addr="6ada4b56d0d9528fbb18edcbc0c3b487", 0x10000}, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x11}}}]}, 0xc0}}, 0x84) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000240)='/dev/full\x00', 0x981, 0x0) 00:18:00 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)={0x2, 0x400000000000003, 0x0, 0x100000000008, 0x20, 0x0, 0x70bd2b, 0x1, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @remote}}, @sadb_x_sa2={0x2, 0x13, 0x7, 0x0, 0x0, 0x70bd2a, 0x3502}, @sadb_ident={0x2, 0x0, 0x714, 0x0, 0x8}, @sadb_x_nat_t_type={0x1}, @sadb_x_sec_ctx={0x14, 0x18, 0x9, 0xffffffffffffffff, 0x97, "b01db418250ba7f562f6bfe2d5215e7f1bb4d3c9881d6bbd804b38fc43f3f1ac77c924fe63467a24dff1968f2429ca355362ed66dd364cb4babc896c718d55f6813b180cdf075a6e70d37081347ff3b24e3f7e29ef098b79e2855285dcf915ba5a45f472752867e92c5747b0a38d6c5aed99f1d205fc86a910143e40faedc46217aa4a56be80707a061034e684c3657af682f952df2131"}]}, 0x100}}, 0x0) 00:18:00 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:18:01 executing program 5: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x14e24}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = socket(0x10, 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000040)) syz_open_pts(r2, 0x0) ioctl$TCXONC(r2, 0x540a, 0x3f) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) getpeername$packet(r1, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_procfs(0x0, &(0x7f0000001780)='fd/4\x00') bind$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @rand_addr="fe168b8492a2e7e8daa62b341bed8b7a"}, 0x1c) setxattr$trusted_overlay_upper(0x0, 0x0, &(0x7f0000000100)={0x0, 0xfb, 0x15, 0x2, 0x1ff, "55f8a1ffd918b6813ab3424d3b104911"}, 0x15, 0x2) getsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f0000000240)={@remote, 0x0}, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000007c0)={{{@in6=@dev={0xfe, 0x80, [], 0x28}, @in6=@rand_addr="568bd9ab9201b4261444148bbc9304d9", 0x4e24, 0x1, 0x4e24, 0x0, 0x0, 0x0, 0x0, 0x0, r6, r7}, {0xee2, 0x80, 0xffff, 0x46, 0x0, 0x8, 0x5, 0x5}, {0x8, 0x41c019c6, 0x3}, 0x4, 0x6e6bb8, 0x2, 0x1, 0x1}, {{@in6=@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x15}}, 0x4d4, 0xff}, 0xa, @in=@rand_addr=0x4, 0x3500, 0x3, 0x3, 0x0, 0x794, 0x9, 0x9}}, 0xe8) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000300)=@security={'security\x00', 0xe, 0x4, 0x358, 0x498, 0x498, 0x0, 0x498, 0x270, 0x588, 0x588, 0x588, 0x588, 0x588, 0x4, 0x0, {[{{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @dev, 0x1, 0xd, [0x12, 0x9, 0x3, 0x0, 0x2e, 0x0, 0x8, 0x0, 0x0, 0x29, 0xd, 0x1e, 0x0, 0x1], 0x2, 0x2, 0x10000}}}, {{@ip={@rand_addr=0x8, @loopback, 0x0, 0xffffff00, 'veth1\x00', 'irlan0\x00', {0xff}, {}, 0xdf}, 0x0, 0x98, 0x108}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x9, 0x7f, 0x0, 0x0, 0x0, "866cf9b241d95d17c5466ddf3af63bedbdd66d2e9f344a415191f5f7f06dd1bea7bc4d50798e2da07ddc3331df6d14aa2f6415c6a9469899687e648623b03163"}}}, {{@ip={@initdev={0xac, 0x1e, 0x1, 0x0}, @initdev, 0xffffffff, 0xff0000ff, 'veth0\x00', 'ip6_vti0\x00', {}, {0xff}, 0x0, 0x1, 0x20}, 0x0, 0x98, 0xc0}, @common=@unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x9}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x3b8) 00:18:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfec7be070") getsockopt$sock_buf(r0, 0x1, 0x14, &(0x7f0000b56f40)=""/192, &(0x7f0000000080)=0xc0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = syz_open_pts(0xffffffffffffff9c, 0x0) ioctl$KDGETLED(r3, 0x4b31, &(0x7f00000001c0)) setregid(r1, r2) 00:18:01 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="024c5bda6615bc6e720000e9ffffff4d"], 0x10}}, 0x0) 00:18:01 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) setxattr$security_smack_entry(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000180)='security.SMACK64MMAP\x00', 0x0, 0x0, 0x2) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x4000000000000, 0x1, {0x7, 0x1f, 0x1, 0x0, 0xfffffffffffffffd}}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:18:01 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x7, 0x2000000000000160, 0x0, 0x0, 0x10000000000000}, 0x90}}, 0x20000000000) socket$key(0xf, 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) write$P9_RAUTH(r1, &(0x7f0000000040)={0x14, 0x67, 0x2, {0x0, 0x4, 0x2}}, 0x14) 00:18:01 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:18:02 executing program 1: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) unlink(&(0x7f0000000200)='./file0\x00') creat(&(0x7f0000000080)='./file1\x00', 0x0) clone(0x1000109, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() lsetxattr$trusted_overlay_redirect(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)='trusted.overlay.redirect\x00', 0x0, 0xffffffffffffff3f, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x35, 0x5, 0x1, "cc1074000fc1de8f8846ad23343f30b9", "15a088ca3708d32613e8c8bd722d9f644db99380c2e25dae76d0940d3ec3af82"}, 0x35, 0x1) tkill(r1, 0x26) creat(&(0x7f00000000c0)='./file0\x00', 0x0) 00:18:02 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)=ANY=[@ANYBLOB="0203000313000000000000000000000005000600000000000a0000000000000000000000000000000000ffff00000000000000000000000000000900000000000a0000000000000000000000000600000000000000000000000000000000000002000100000000000000020b0000000005000500000000000a00000000000000ff0200000000000000000000000000010000000000000000"], 0x98}}, 0x0) 00:18:02 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(0xffffffffffffffff, &(0x7f0000003000), 0x7c) read$FUSE(0xffffffffffffffff, &(0x7f0000001000), 0x1000) write$FUSE_INIT(0xffffffffffffffff, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(0xffffffffffffffff, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:18:02 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f0000003000), 0x7c) open(&(0x7f0000000040)='./file0\x00', 0x200800, 0x41) setxattr$security_smack_entry(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000280)='security.SMACK64MMAP\x00', 0x0, 0x257, 0x1) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:18:02 executing program 4: r0 = dup(0xffffffffffffffff) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x12, 0x4b53, 0xf, 0x16, 0x0, 0x70bd25, 0x25dfdbff, [@sadb_x_kmaddress={0x5, 0x19, 0x0, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e24, @empty}}, @sadb_x_sa2={0x2, 0x13, 0x1, 0x0, 0x0, 0x70bd2c, 0x3507}, @sadb_x_policy={0x8, 0x12, 0x1, 0x2, 0x0, 0x0, 0x965, {0x6, 0x7e, 0x4, 0x100000001, 0x0, 0xed, 0x0, @in6=@dev={0xfe, 0x80, [], 0xb}, @in6=@ipv4={[], [], @multicast1}}}, @sadb_x_filter={0x5, 0x1a, @in=@local, @in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x9, 0x10, 0x10}]}, 0xb0}}, 0x8800) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) 00:18:03 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) chroot(&(0x7f0000000080)='./file0\x00') read$FUSE(r0, &(0x7f0000003000), 0x7c) read$FUSE(r0, &(0x7f0000001000), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) write$FUSE_INTERRUPT(r0, &(0x7f0000000380)={0x10, 0x0, 0x2}, 0x10) 00:18:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca5055e0bcfec7be070") r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)='+', 0x1}], 0x1}, 0xc900) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000300)="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", 0xbd1}], 0x1) 00:18:03 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000b6dfc8)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000080)={0x2, 0x400000000000003, 0x0, 0x3, 0x13, 0x0, 0x0, 0x0, [@sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @ipv4}}, @sadb_address={0x5, 0x9, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @empty={[0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}}, @sadb_sa={0x2, 0x1, 0x0, 0x0, 0x0, 0x2, 0xffffff0b}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @mcast2}}]}, 0x98}}, 0x0) r1 = dup(r0) ioctl$RTC_AIE_OFF(r1, 0x7002) ioctl$RTC_EPOCH_READ(r1, 0x8008700d, &(0x7f0000000000)) [ 1067.920915] BUG: unable to handle kernel paging request at 000000006c10cd04 [ 1067.928332] IP: [<00000000093654c0>] fuse_dev_do_write+0x1821/0x22c0 [ 1067.935018] PGD 21fffb067 [ 1067.937684] PUD 21fff9067 PMD 0 [ 1067.941216] [ 1067.942866] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1067.947440] Modules linked in: [ 1067.950777] CPU: 0 PID: 23403 Comm: syz-executor.3 Not tainted 4.9.181+ #7 [ 1067.957829] task: 000000009952b7ce task.stack: 00000000bc386ded [ 1067.963912] RIP: 0010:[] [<00000000093654c0>] fuse_dev_do_write+0x1821/0x22c0 [ 1067.973082] RSP: 0018:ffff8801a52bf9a8 EFLAGS: 00010a07 [ 1067.978609] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffc9000254d000 [ 1067.985876] RDX: 1ffff1005a2a6fff RSI: ffffffff8187085d RDI: ffff8801d31ac9d0 [ 1067.993229] RBP: ffff8801a52bfba0 R08: ffff8801d1538000 R09: 0000000000000001 [ 1068.000493] R10: 0000000000000000 R11: 0000000000000001 R12: ffff8801d31ac920 [ 1068.007770] R13: ffff8802d1537fff R14: ffff8801c76cda80 R15: ffff8801a52bfbe0 [ 1068.015034] FS: 00007fcf92e80700(0000) GS:ffff8801db600000(0000) knlGS:0000000000000000 [ 1068.023254] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1068.029131] CR2: ffffed005a2a6fff CR3: 00000001b2bdb000 CR4: 00000000001606b0 [ 1068.036398] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1068.043660] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 1068.050922] Stack: [ 1068.053066] ffffffff81bf5ecf 9bd6c5a800000000 ffff8801d31ac920 ffff8801d31ac9d0 [ 1068.061138] ffffffff00000001 ffff880100001000 ffff8801d31ac9bc ffff8801d31ac9c8 [ 1068.069200] ffff8801c76cda88 ffff8801d31ac950 ffff8801c76cda90 ffff8801ceae5500 [ 1068.077277] Call Trace: [ 1068.079889] [<00000000315f9f43>] ? should_fail+0xcf/0x360 [ 1068.085517] [<00000000529b9186>] ? fuse_dev_release+0x490/0x490 [ 1068.091663] [<00000000a2580446>] ? futex_wait_setup+0x350/0x350 [ 1068.097806] [<000000009c8ab6de>] ? futex_wake+0x1b3/0x460 [ 1068.103425] [<00000000135afa30>] ? futex_wake+0x3ad/0x460 [ 1068.109045] [<00000000c3475542>] ? futex_wait_restart+0x230/0x230 [ 1068.115360] [<00000000d2177b85>] fuse_dev_write+0x144/0x1d0 [ 1068.121207] [<00000000337fc3ec>] ? fuse_dev_splice_write+0x9e0/0x9e0 [ 1068.127877] [<00000000f6e16850>] ? debug_smp_processor_id+0x1c/0x20 [ 1068.134386] [<000000009f24f2cd>] ? perf_trace_lock_acquire+0x530/0x530 [ 1068.141141] [<00000000334c9688>] ? iov_iter_init+0xaf/0x1d0 [ 1068.146954] [<00000000c42fcd0f>] __vfs_write+0x3c1/0x560 [ 1068.152488] [<0000000028efd515>] ? __vfs_read+0x550/0x550 [ 1068.158139] [<0000000082360a26>] ? avc_policy_seqno+0x9/0x20 [ 1068.164022] [<00000000fedc19cd>] ? selinux_file_permission+0x85/0x470 [ 1068.170684] [<00000000a66dbf09>] ? security_file_permission+0x8f/0x1f0 [ 1068.177451] [<00000000a83b27d1>] ? rw_verify_area+0xea/0x2b0 [ 1068.183339] [<000000001b75b89f>] vfs_write+0x185/0x520 [ 1068.188712] [<000000007dcd5a4c>] SyS_write+0x121/0x270 [ 1068.194064] [<00000000bc046d3a>] ? SyS_read+0x270/0x270 [ 1068.199516] [<0000000029ab31e2>] ? do_syscall_64+0x4a/0x5c0 [ 1068.205309] [<00000000bc046d3a>] ? SyS_read+0x270/0x270 [ 1068.210750] [<000000004d7003a0>] do_syscall_64+0x1ad/0x5c0 [ 1068.216505] [<00000000df4e0e18>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb [ 1068.223503] Code: c0 74 08 3c 03 0f 8e cf 06 00 00 41 8b 84 24 b0 00 00 00 44 8d 68 ff 48 b8 00 00 00 00 00 fc ff df 4d 01 c5 4c 89 ea 48 c1 ea 03 <0f> b6 04 02 4c 89 ea 83 e2 07 38 d0 7f 08 84 c0 0f 85 75 06 00 [ 1068.251190] RIP [<00000000093654c0>] fuse_dev_do_write+0x1821/0x22c0 [ 1068.257895] RSP [ 1068.261517] CR2: ffffed005a2a6fff [ 1068.264973] ---[ end trace 1695ede8aaebfda2 ]--- [ 1068.269714] Kernel panic - not syncing: Fatal exception [ 1068.275769] Kernel Offset: disabled [ 1068.279390] Rebooting in 86400 seconds..